Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9jxw-cfrh-jxq6

Опубликовано: 30 авг. 2021
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Cachet vulnerable to new line injection during configuration edition

Impact

Authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server.

Patches

This issue was addressed by improving UpdateConfigCommandHandler and preventing the use of new lines characters in new configuration values.

Workarounds

Only allow trusted source IP addresses to access to the administration dashboard.

References

For more information

If you have any questions or comments about this advisory, you can contact:

  • The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
  • The maintainers, by opening an issue on this repository.

Пакеты

Наименование

cachethq/cachet

composer
Затронутые версииВерсия исправления

< 2.5.1

2.5.1

EPSS

Процентиль: 98%
0.57897
Средний

8.8 High

CVSS3

Дефекты

CWE-93

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

CVSS3: 8.8
debian
больше 4 лет назад

Cachet is an open source status page system. Prior to version 2.5.1, a ...

EPSS

Процентиль: 98%
0.57897
Средний

8.8 High

CVSS3

Дефекты

CWE-93