Описание
1Panel O&M management panel has a background arbitrary file reading vulnerability
Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability

PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:

Impact
1Panel v1.4.3
Пакеты
github.com/1Panel-dev/1Panel
= 1.4.3
1.5.0
Связанные уязвимости
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the `api/v1/file.go` file, there is a function called `LoadFromFile`, which directly reads the file by obtaining the requested path `parameter[path]`. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.