{"id":1195,"date":"2020-11-23T20:24:41","date_gmt":"2020-11-24T01:24:41","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1195"},"modified":"2020-11-23T20:24:43","modified_gmt":"2020-11-24T01:24:43","slug":"zeroday-vulnerabilities-in-centos-that-are-quite-dangerous","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/","title":{"rendered":"CentOS Vulnerabilities that are dangerous"},"content":{"rendered":"\n<p>Experts in vulnerabilities analysis report the discovery of several security vulnerabilities in CentOS, a free hosting management panel designed to facilitate the administration of dedicated servers and VPS. According to the report, the successful exploitation of these vulnerabilities could allow scenarios such as SQL injection or directory escalations, which can become quite a big problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Some vulnerabilities on CentOS<\/h2>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>Insufficient sanitization of user input in the &#8220;user&#8221; parameter of &#8220;ajax_mail_autoreply.php&#8221; allows remote hackers to execute arbitrary SQL queries on the target database.<\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>Insufficient sanitization of user input in the &#8220;package&#8221; parameter in &#8220;ajax_list_accounts.php&#8221; allows remote threat attackers to run arbitrary SQL queries on the target database.<\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>This flaw exists due to the inadequate purification of the data provided by the users, mention the experts in vulnerability analysis. The flaw would allow obtaining confidential information by executing arbitrary SQL queries.<\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>The flaw exists due to insufficient sanitization of the data provided by the user in the &#8220;search&#8221; parameter of &#8220;ajax_mail_autoreply.php&#8221;. Remote hackers could send a specially crafted request to run arbitrary SQL queries.<\/p>\n\n\n\n<p><strong><em>\u25b8<\/em><\/strong>An input validation error when processing traversal sequences within the &#8220;ajax_mod_security.php&#8221; parameter in &#8220;file&#8221; would allow attackers to execute directory escalation attacks, this is a pretty serious vulnerability.<\/p>\n\n\n\n<p>These vulnerabilities are quite dangerous and the only thing we can do is wait for them to be corrected, the good side is that so far not many abuses of these vulnerabilities have been reported. These vulnerabilities can be controlled and the best thing you can do is look and be cautious with them in case you have CentOS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts in vulnerabilities analysis report the discovery of several security vulnerabilities in CentOS, a free hosting management panel designed to facilitate the administration of dedicated servers and VPS. According to the report, the successful exploitation of these vulnerabilities could allow scenarios such as SQL injection or directory escalations, which can become quite a big problem. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,3],"tags":[36,197],"class_list":["post-1195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-linux","tag-cybersecurity","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CentOS Vulnerabilities that are dangerous - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CentOS Vulnerabilities that are dangerous - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-24T01:24:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-24T01:24:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1125\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"CentOS Vulnerabilities that are dangerous\",\"datePublished\":\"2020-11-24T01:24:41+00:00\",\"dateModified\":\"2020-11-24T01:24:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/\"},\"wordCount\":276,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-web.jpg\",\"keywords\":[\"Cybersecurity\",\"Vulnerabilities\"],\"articleSection\":[\"Cybersecurity\",\"Linux\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/\",\"name\":\"CentOS Vulnerabilities that are dangerous - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-web.jpg\",\"datePublished\":\"2020-11-24T01:24:41+00:00\",\"dateModified\":\"2020-11-24T01:24:43+00:00\",\"description\":\"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-web.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/security-web.jpg\",\"width\":1125,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CentOS Vulnerabilities that are dangerous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CentOS Vulnerabilities that are dangerous - Truxgo Server Blog","description":"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/","og_locale":"es_MX","og_type":"article","og_title":"CentOS Vulnerabilities that are dangerous - Truxgo Server Blog","og_description":"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.","og_url":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/","og_site_name":"Truxgo Server Blog","article_published_time":"2020-11-24T01:24:41+00:00","article_modified_time":"2020-11-24T01:24:43+00:00","og_image":[{"width":1125,"height":750,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"CentOS Vulnerabilities that are dangerous","datePublished":"2020-11-24T01:24:41+00:00","dateModified":"2020-11-24T01:24:43+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/"},"wordCount":276,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg","keywords":["Cybersecurity","Vulnerabilities"],"articleSection":["Cybersecurity","Linux"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/","url":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/","name":"CentOS Vulnerabilities that are dangerous - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg","datePublished":"2020-11-24T01:24:41+00:00","dateModified":"2020-11-24T01:24:43+00:00","description":"These vulnerabilities being present in CentOS, if you have this software in possession the best thing you can do is be cautious and be aware.","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/11\/security-web.jpg","width":1125,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/zeroday-vulnerabilities-in-centos-that-are-quite-dangerous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CentOS Vulnerabilities that are dangerous"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1195"}],"version-history":[{"count":5,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1195\/revisions"}],"predecessor-version":[{"id":1202,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1195\/revisions\/1202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1197"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}