Description
VestaCP 0.9.8-26 contains a session token vulnerability in the LoginAs module that allows remote attackers to manipulate authentication tokens. Attackers can exploit insufficient token validation to access user accounts and perform unauthorized login requests without proper administrative permissions.
Problem types
Product status
Credits
Vulnerability-Lab
References
www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.
www.exploit-db.com/exploits/49219
www.vulnerability-lab.com/get_content.php?id=2240
www.exploit-db.com/exploits/49219 (ExploitDB-49219)
vestacp.com/ (VestaCP Official Homepage)
www.vulnerability-lab.com/get_content.php?id=2240 (Vulnerability Lab Advisory)
www.vulnerability-lab.com/show.php?user=Benjamin%20K.M. (Benjamin Kunz Mejri Profile)
www.vulncheck.com/...loginas-insufficient-session-validation (VulnCheck Advisory: VestaCP 0.9.8-26 - 'LoginAs' Insufficient Session Validation)