Описание
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving UpdateConfigCommandHandler and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Ссылки
- ExploitThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Release NotesThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.1 (исключая)
cpe:2.3:a:catchethq:catchet:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.57897
Средний
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-93
Связанные уязвимости
CVSS3: 8.8
debian
больше 4 лет назад
Cachet is an open source status page system. Prior to version 2.5.1, a ...
CVSS3: 8.8
github
больше 4 лет назад
Cachet vulnerable to new line injection during configuration edition
EPSS
Процентиль: 98%
0.57897
Средний
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-93