Pi-hole 5.2.4 multiple privilege escalation vulnerabilities. GitHub security advisory
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | Pi-Hole Remove Commands Linux Priv Esc | 30 May 202118:48 | – | metasploit |
![]() | Pi-Hole Remove Commands Linux Privilege Escalation | 30 Jul 202100:00 | – | packetstorm |
![]() | CVE-2021-29449 | 14 Apr 202122:15 | – | nvd |
![]() | Pi-hole Core < 5.3 Multiple Privilege Escalation Vulnerabilities | 16 Apr 202100:00 | – | openvas |
![]() | CVE-2021-29449 Multiple Privilege Escalation Vulnerabilities Pihole | 14 Apr 202122:05 | – | cvelist |
![]() | CVE-2021-29449 | 14 Apr 202100:00 | – | attackerkb |
![]() | Pi-Hole Remove Commands Linux Privilege Escalation Exploit | 30 Jul 202100:00 | – | zdt |
![]() | Privilege escalation | 14 Apr 202122:15 | – | prion |
![]() | CVE-2021-29449 | 14 Apr 202122:15 | – | osv |
![]() | Metasploit Wrap-Up | 30 Jul 202118:04 | – | rapid7blog |
[
{
"product": "pi-hole",
"vendor": "pi-hole",
"versions": [
{
"status": "affected",
"version": "<= 5.2.4"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
removestaticdhcp | request body | /usr/local/bin/pihole | Pi-Hole versions 3.0 - 5.3 allow command line input to functions without proper validation, leading to privilege escalation when executed as the www-data user. | CWE-78, CWE-269 |
removecustomdns | request body | /usr/local/bin/pihole | Pi-Hole versions 3.0 - 5.3 allow command line input to functions without proper validation, leading to privilege escalation when executed as the www-data user. | CWE-78, CWE-269 |
removecustomcname | request body | /usr/local/bin/pihole | Pi-Hole versions 3.0 - 5.3 allow command line input to functions without proper validation, leading to privilege escalation when executed as the www-data user. | CWE-78, CWE-269 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo