Vulnerability Description
In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, the Login process allows attackers to check whether a username is valid by reading the HTTP response.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Control-Webpanel | Webpanel | 0.9.8.836 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-UThird Party AdvisoryVDB Entry
- https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-201ExploitThird Party Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010Third Party Advisory
- http://packetstormsecurity.com/files/153667/CentOS-Control-Web-Panel-0.9.8.838-UThird Party AdvisoryVDB Entry
- https://github.com/i3umi3iei3ii/CentOS-Control-Web-Panel-CVE/blob/master/CVE-201ExploitThird Party Advisory
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010Third Party Advisory
FAQ
What is CVE-2019-13383?
CVE-2019-13383 is a vulnerability with a CVSS score of 5.3 (MEDIUM). In CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.846, the Login process allows attackers to check whether a username is valid by reading the HTTP response.
How severe is CVE-2019-13383?
CVE-2019-13383 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13383?
Check the references section above for vendor advisories and patch information. Affected products include: Control-Webpanel Webpanel.