External Control of File Name or Path in hestiacp/hestiacp


Reported on

Sep 9th 2021

✍️ Description

External Control of File Name or Path is a type of security flaw in which users can access resources from restricted locations on a file system. It is commonly called path traversal. If an attacker performs a path traversal attack successfully, they could potentially view sensitive files or other confidential information. This threat is possible when applications allow a user to specify the filename used in a file system operation.

The user input POST parameter v_package of index.php is unsanitized resulting external control of filename.


Apply context-dependent encoding and/or validation to user input rendered on a page

We have contacted a member of the hestiacp team and are waiting to hear back 2 years ago
Jaap Marcus validated this vulnerability 2 years ago
wtwver has been awarded the disclosure bounty
The fix bounty is now up for grabs
Jaap Marcus marked this as fixed with commit b962e0 2 years ago
Jaap Marcus has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation