First published: Tue Dec 17 2019(Updated: )
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.864 allows an attacker to get a victim's session file name from /home/[USERNAME]/tmp/session/sess_xxxxxx, and the victim's token value from /usr/local/cwpsrv/logs/access_log, then use them to gain access to the victim's password (for the OS and phpMyAdmin) via an attacker account. This is different from CVE-2019-14782.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CWP Control Web Panel | >=0.9.8.856<=0.9.8.864 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15235 is a vulnerability in CentOS-WebPanel.com (CWP) CentOS Web Panel 0.9.8.864 that allows an attacker to access a victim's session file name and token value to gain access to the victim's password.
CVE-2019-15235 has a severity level of 6.5, classified as medium.
An attacker can exploit CVE-2019-15235 by retrieving a victim's session file name and token value to gain access to the victim's password.