Lucene search

K
githubGitHub Advisory DatabaseGHSA-PV7Q-V9MV-9MH5
HistoryAug 10, 2023 - 8:09 p.m.

1Panel O&M management panel has a background arbitrary file reading vulnerability

2023-08-1020:09:07
CWE-22
GitHub Advisory Database
github.com
19
arbitrary file reading
configuration files
api vulnerability
software version

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.1%

Summary

Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.

Details

In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
picture1

PoC

Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
微信图片_20230731112833

Impact

1Panel v1.4.3

Affected configurations

Vulners
Node
github.com\/1paneldev\/1panelMatch1.4.3
CPENameOperatorVersion
github.com/1panel-dev/1paneleq1.4.3

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

37.1%

Related for GHSA-PV7Q-V9MV-9MH5