Vulnerability Description
ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.
CVSS Score
6.1
MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ajenti | Ajenticp | <= 1.2.23.13 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-ScriptThird Party AdvisoryVDB Entry
- https://numanozdemir.com/ajenti-xss.txtThird Party Advisory
- https://www.exploit-db.com/exploits/45691/Third Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/149898/AjentiCP-1.2.23.13-Cross-Site-ScriptThird Party AdvisoryVDB Entry
- https://numanozdemir.com/ajenti-xss.txtThird Party Advisory
- https://www.exploit-db.com/exploits/45691/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-18548?
CVE-2018-18548 is a vulnerability with a CVSS score of 6.1 (MEDIUM). ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a filename that is mishandled in File Manager.
How severe is CVE-2018-18548?
CVE-2018-18548 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18548?
Check the references section above for vendor advisories and patch information. Affected products include: Ajenti Ajenticp.