### [CVE-2018-1000083](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000083) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Ajenti version version 2 contains a Improper Error Handling vulnerability in Login JSON request that can result in The requisition leaks a path of the server. This attack appear to be exploitable via By sending a malformed JSON, the tool responds with a traceback error that leaks a path of the server. ### POC #### Reference - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee - https://medium.com/stolabs/security-issues-on-ajenti-d2b7526eaeee #### Github - https://github.com/sketler/sketler