mirror of
https://github.com/myvesta/vesta
synced 2025-08-14 18:49:21 -07:00
Potential remote code execution vulnerability fix.
Can be exploitable, when we have X-Forwarded-For->X-Real-IP transformation.
This commit is contained in:
parent
9c59a69b1a
commit
512283e528
1 changed files with 2 additions and 1 deletions
|
@ -14,7 +14,8 @@ if (isset($_POST['user']) || isset($_POST['hash'])) {
|
|||
|
||||
$v_user = escapeshellarg($_POST['user']);
|
||||
$v_password = escapeshellarg($_POST['password']);
|
||||
exec(VESTA_CMD ."v-check-user-password ".$v_user." ".$v_password." '".$_SERVER["REMOTE_ADDR"]."'", $output, $auth_code);
|
||||
$v_ip_addr = escapeshellarg($_SERVER["REMOTE_ADDR"]);
|
||||
exec(VESTA_CMD ."v-check-user-password ".$v_user." ".$v_password." '".$v_ip_addr."'", $output, $auth_code);
|
||||
} else {
|
||||
$key = '/usr/local/vesta/data/keys/' . basename($_POST['hash']);
|
||||
if (file_exists($key) && is_file($key)) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue