Описание
Dokploy is a free, self-hostable Platform as a Service (PaaS). In versions prior to 0.26.6, a critical command injection vulnerability exists in Dokploy's WebSocket endpoint /docker-container-terminal. The containerId and activeWay parameters are directly interpolated into shell commands without sanitization, allowing authenticated attackers to execute arbitrary commands on the host server. Version 0.26.6 fixes the issue.
Ссылки
- Product
- Patch
- ExploitVendor AdvisoryMitigation
Уязвимые конфигурации
Конфигурация 1Версия до 0.26.6 (исключая)
cpe:2.3:a:dokploy:dokploy:*:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.00262
Низкий
9.9 Critical
CVSS3
9.9 Critical
CVSS3
Дефекты
CWE-78
EPSS
Процентиль: 49%
0.00262
Низкий
9.9 Critical
CVSS3
9.9 Critical
CVSS3
Дефекты
CWE-78