CVE-2021-39174

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-39174
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-39174.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-39174
Aliases
Published
2021-08-28T00:15:06Z
Modified
2024-05-15T01:14:52.397925Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (APP_KEY) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving UpdateConfigCommandHandler and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

References

Affected packages

Git / github.com/fiveai/cachet

Affected ranges

Type
GIT
Repo
https://github.com/fiveai/cachet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1

v2.*

v2.0.0
v2.0.0-RC1
v2.0.0-RC2
v2.0.0-RC3
v2.0.0-RC4
v2.0.0-RC5
v2.0.0-beta1
v2.0.0-beta2
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.1.0
v2.1.0-RC1
v2.1.0-RC2
v2.1.1
v2.1.2
v2.2.0
v2.2.0-RC1
v2.2.1
v2.2.2
v2.2.3
v2.2.4
v2.3.0
v2.3.0-RC1
v2.3.0-RC2
v2.3.0-RC3
v2.3.0-RC4
v2.3.0-RC5
v2.3.0-RC6
v2.3.1
v2.3.10
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.6
v2.3.7
v2.3.8
v2.3.9
v2.5.0