Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-D647122C45A13C96CB22FB8CF4B345D0
HistoryMar 06, 2024 - 12:00 a.m.

1Panel open source panel project has an unauthorized vulnerability.

2024-03-0600:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
30
open source
project
unauthorized vulnerability
impact
affected versions
patches
workarounds

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Impact

The steps are as follows:

  1. Access https://IP:PORT/ in the browser, which prompts the user to access with a secure entry point.
    image

  2. Use Burp to intercept:
    image

When opening the browser and entering the URL (allowing the first intercepted packet through Burp), the following is displayed:
image

It is found that in this situation, we can access the console page (although no data is returned and no modification operations can be performed)."

Affected versions: <= 1.10.0-lts

Patches

The vulnerability has been fixed in v1.10.1-lts.

Workarounds

It is recommended to upgrade the version to 1.10.1-lts.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/1Panel-dev/1Panel
Email us at [email protected]

Affected configurations

Vulners
Node
go1panelRange<1.10.1-lts

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for GITLAB-D647122C45A13C96CB22FB8CF4B345D0