Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wjqw-p6cv-p8gj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.

Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.

EPSS

Процентиль: 21%
0.00067
Низкий

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 7.8
nvd
больше 5 лет назад

Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.

EPSS

Процентиль: 21%
0.00067
Низкий

Дефекты

CWE-94