Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-827F8DB409D887B992A5300B135C246A
HistoryAug 10, 2023 - 12:00 a.m.

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

2023-08-1000:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
7
path traversal
arbitrary file reads
configuration files
security patch

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.

Affected configurations

Vulners
Node
go1panelMatchv1.4.3
VendorProductVersionCPE
go1panelv1.4.3cpe:2.3:a:go:1panel:v1.4.3:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

50.5%

Related for GITLAB-827F8DB409D887B992A5300B135C246A