This alarming exploit leverages weaknesses in the password reset mechanism, posing a severe risk to users relying on Vesta for server management. According to the Fortbridge report, the core of the vulnerability lies in using the bash $RANDOM variable during the password reset process. The Vesta password reset function relies on a PHP script that checks if a reset token matches an existing one stored in user configuration files. By exploiting this weakness, attackers can generate valid password reset tokens, gaining unauthorized access to admin accounts. Researchers have demonstrated that they can predict all future password reset tokens by brute-forcing the seed used by $RANDOM. A vulnerability in the Vesta Control Panel has been discovered that allows attackers to take over entire Linux servers. This file checks if the reset token($_POST[‘code’]) received from the url is equal to $rkey and if they match it will proceed to reset the user’s password. When a user requests a password reset, they receive an email with a link containing this token. This vulnerability allows an attacker to take over an entire server, which poses serious risks, including data breaches and unauthorized control over hosted websites. Vesta users are strongly advised to update their systems with patches provided by developers and consider implementing additional security measures such as two-factor authentication. Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world. Users are encouraged to stay informed about updates from Vesta and other security advisories to safeguard their digital assets effectively. Vesta is a web-based control panel that simplifies server management for Linux users. Generate a new code for the next password reset.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 01 Oct 2024 12:20:27 +0000