Lucene search

K
osvGoogleOSV:GHSA-9JXW-CFRH-JXQ6
HistoryAug 30, 2021 - 4:11 p.m.

Cachet vulnerable to new line injection during configuration edition

2021-08-3016:11:24
Google
osv.dev
19
cachet
new line injection
configuration edition
code execution
authenticated users
arbitrary
command handler
ip addresses
server security

EPSS

0.007

Percentile

81.2%

Impact

Authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server.

Patches

This issue was addressed by improving UpdateConfigCommandHandler and preventing the use of new lines characters in new configuration values.

Workarounds

Only allow trusted source IP addresses to access to the administration dashboard.

References

For more information

If you have any questions or comments about this advisory, you can contact:

  • The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
  • The maintainers, by opening an issue on this repository.

EPSS

0.007

Percentile

81.2%