Vulnerability Description
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Local File Inclusion via directory traversal with an admin/index.php?module=file_editor&file=/../ URI.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Control-Webpanel | Webpanel | 0.9.8.480 |
Related Weaknesses (CWE)
References
- https://0day.today/exploit/31304ExploitThird Party Advisory
- https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/Third Party Advisory
- https://www.exploit-db.com/exploits/45610/ExploitThird Party AdvisoryVDB Entry
- https://0day.today/exploit/31304ExploitThird Party Advisory
- https://seccops.com/centos-web-panel-0-9-8-480-multiple-vulnerabilities/Third Party Advisory
- https://www.exploit-db.com/exploits/45610/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-18323?
CVE-2018-18323 is a vulnerability with a CVSS score of 7.5 (HIGH). CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Local File Inclusion via directory traversal with an admin/index.php?module=file_editor&file=/../ URI.
How severe is CVE-2018-18323?
CVE-2018-18323 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18323?
Check the references section above for vendor advisories and patch information. Affected products include: Control-Webpanel Webpanel.