GHSA-26w3-q4j8-4xjp

Suggest an improvement
Source
https://github.com/advisories/GHSA-26w3-q4j8-4xjp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-26w3-q4j8-4xjp/GHSA-26w3-q4j8-4xjp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-26w3-q4j8-4xjp
Aliases
Related
Published
2024-03-06T15:29:11Z
Modified
2025-02-11T19:03:36Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVSS Calculator
Summary
1Panel open source panel project has an unauthorized vulnerability.
Details

Impact

The steps are as follows:

  1. Access https://IP:PORT/ in the browser, which prompts the user to access with a secure entry point. image

  2. Use Burp to intercept: image

When opening the browser and entering the URL (allowing the first intercepted packet through Burp), the following is displayed: image

It is found that in this situation, we can access the console page (although no data is returned and no modification operations can be performed)."

Affected versions: <= 1.10.0-lts

Patches

The vulnerability has been fixed in v1.10.1-lts.

Workarounds

It is recommended to upgrade the version to 1.10.1-lts.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com

Database specific
{
    "nvd_published_at": "2024-03-06T19:15:07Z",
    "cwe_ids": [
        "CWE-863"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-03-06T15:29:11Z"
}
References

Affected packages

Go / github.com/1Panel-dev/1Panel

Package

Name
github.com/1Panel-dev/1Panel
View open source insights on deps.dev
Purl
pkg:golang/github.com/1Panel-dev/1Panel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.1-lts

Database specific

{
    "last_known_affected_version_range": "<= 1.10.0-lts"
}