logo
DATABASE RESOURCES PRICING ABOUT US

Cachet vulnerable to new line injection during configuration edition

Description

### Impact Authenticated users, regardless of their privileges (_User_ or _Admin_), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. ### Patches This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. ### Workarounds Only allow trusted source IP addresses to access to the administration dashboard. ### References - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.


Affected Software


CPE Name Name Version
cachethq/cachet 2.5.1

Related