First published: Tue Dec 17 2019(Updated: )
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.856 through 0.9.8.864 allows an attacker to get a victim's session file name from the /tmp directory, and the victim's token value from /usr/local/cwpsrv/logs/access_log, then use them to make a request to extract the victim's password (for the OS and phpMyAdmin) via an attacker account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CWP Control Web Panel | >=0.9.8.856<=0.9.8.864 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-14782 is rated as medium, with a CVSS score of 6.5.
To fix CVE-2019-14782, it is recommended to update CentOS Web Panel to a version beyond 0.9.8.864 as a patch for this vulnerability.
The CWE associated with CVE-2019-14782 is CWE-532, which relates to Insertion of Sensitive Information into Log File vulnerability.