Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pv7q-v9mv-9mh5

Опубликовано: 10 авг. 2023
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

1Panel O&M management panel has a background arbitrary file reading vulnerability

Summary

Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.

Details

In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability picture1

PoC

Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below: 微信图片_20230731112833

Impact

1Panel v1.4.3

Пакеты

Наименование

github.com/1Panel-dev/1Panel

go
Затронутые версииВерсия исправления

= 1.4.3

1.5.0

EPSS

Процентиль: 46%
0.00236
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
больше 2 лет назад

1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the `api/v1/file.go` file, there is a function called `LoadFromFile`, which directly reads the file by obtaining the requested path `parameter[path]`. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.

EPSS

Процентиль: 46%
0.00236
Низкий

7.5 High

CVSS3

Дефекты

CWE-22