First published: Tue Mar 13 2018(Updated: )
Ajenti version 2 contains an Information Disclosure vulnerability in Line 176 of the code source that can result in user and system enumeration as well as data from the /etc/ajenti/config.yml file. This attack appears to be exploitable via network connectivity to the web application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mentiss Acgv Acgvannu | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000126 is classified as having a moderate severity due to its potential for information disclosure.
To fix CVE-2018-1000126, you should update Ajenti to the latest version that has addressed this vulnerability.
Any user or system running Ajenti version 2 is potentially affected by CVE-2018-1000126.
CVE-2018-1000126 can disclose user and system enumeration information as well as contents from the /etc/ajenti/config.yml file.
Yes, CVE-2018-1000126 is exploitable via network connectivity to the affected Ajenti web application.