Lucene search

K
githubGitHub Advisory DatabaseGHSA-PV7Q-V9MV-9MH5
HistoryAug 10, 2023 - 8:09 p.m.

1Panel O&M management panel has a background arbitrary file reading vulnerability

2023-08-1020:09:07
CWE-22
GitHub Advisory Database
github.com
22
arbitrary file reading
configuration files
api vulnerability
software version

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

Summary

Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.

Details

In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
picture1

PoC

Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
微信图片_20230731112833

Impact

1Panel v1.4.3

Affected configurations

Vulners
Node
1panel-dev1panelMatch1.4.3
VendorProductVersionCPE
1panel-dev1panel1.4.3cpe:2.3:a:1panel-dev:1panel:1.4.3:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

Related for GHSA-PV7Q-V9MV-9MH5