Skip to main content

CVE-2021-46850: n/a in n/a

High
VulnerabilityCVE-2021-46850cvecve-2021-46850
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

myVesta Control Panel before 0.9.8-26-43 and Vesta Control Panel before 0.9.8-26 are vulnerable to command injection. An authenticated and remote administrative user can execute arbitrary commands via the v_sftp_license parameter when sending HTTP POST requests to the /edit/server endpoint.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:41:36 UTC

Technical Analysis

CVE-2021-46850 is a high-severity command injection vulnerability affecting versions of myVesta Control Panel prior to 0.9.8-26-43 and Vesta Control Panel prior to 0.9.8-26. The vulnerability allows an authenticated remote administrative user to execute arbitrary system commands by manipulating the 'v_sftp_license' parameter in HTTP POST requests sent to the '/edit/server' endpoint. This flaw arises due to insufficient input validation or improper sanitization of this parameter, categorized under CWE-88 (Improper Neutralization of Argument Delimiters in a Command). Exploitation requires administrative credentials, but no user interaction beyond sending the crafted HTTP request is necessary. The CVSS v3.1 base score is 7.2, reflecting high impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise, data exfiltration, or disruption of services. The vulnerability is network exploitable (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H). No known public exploits have been reported yet, and no official patches or vendor advisories are linked in the provided data. The affected products are control panels commonly used for server management, which typically run on Linux-based hosting environments and are used by web hosting providers and enterprises to manage web servers, databases, and related services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on myVesta or Vesta Control Panels to manage their web hosting infrastructure. Successful exploitation could lead to unauthorized command execution, enabling attackers to gain full control over the affected servers. This could result in data breaches involving sensitive customer or corporate data, disruption of hosted services, defacement of websites, or use of compromised servers as pivot points for further attacks within the network. Given the administrative access requirement, insider threats or compromised administrative credentials could be leveraged by attackers. The impact extends to confidentiality, integrity, and availability of critical systems. Organizations in sectors such as finance, healthcare, e-commerce, and government, which often host sensitive data and require high availability, could face regulatory penalties under GDPR if data breaches occur. Additionally, disruption of services could damage reputation and cause financial losses.

Mitigation Recommendations

European organizations should immediately verify if they are using vulnerable versions of myVesta or Vesta Control Panels. If so, they should upgrade to the latest patched versions as soon as they become available from the vendor. In the absence of official patches, organizations should implement compensating controls such as restricting administrative access to trusted IP addresses via firewall rules or VPNs, enforcing strong multi-factor authentication for administrative accounts, and monitoring logs for suspicious POST requests to the '/edit/server' endpoint, especially those containing the 'v_sftp_license' parameter. Network segmentation should be employed to isolate management interfaces from general user networks. Additionally, organizations should conduct regular credential audits to ensure administrative accounts have not been compromised. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block command injection patterns targeting this parameter can provide temporary protection. Finally, organizations should prepare incident response plans to quickly address any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-24T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd985d

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 1:41:36 PM

Last updated: 8/10/2025, 2:12:10 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats