Описание
Cachet vulnerable to new line injection during configuration edition
Impact
Authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server.
Patches
This issue was addressed by improving UpdateConfigCommandHandler and preventing the use of new lines characters in new configuration values.
Workarounds
Only allow trusted source IP addresses to access to the administration dashboard.
References
For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
Ссылки
- https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6
- https://nvd.nist.gov/vuln/detail/CVE-2021-39172
- https://github.com/fiveai/Cachet/commit/6442976c25930cb370c65a22784b9caee7ed1de2
- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection
- https://github.com/fiveai/Cachet/releases/tag/v2.5.1
Пакеты
cachethq/cachet
< 2.5.1
2.5.1
Связанные уязвимости
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Cachet is an open source status page system. Prior to version 2.5.1, a ...