GHSA-p9xf-74xh-mhw5

Suggest an improvement
Source
https://github.com/advisories/GHSA-p9xf-74xh-mhw5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-p9xf-74xh-mhw5/GHSA-p9xf-74xh-mhw5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-p9xf-74xh-mhw5
Aliases
Related
Published
2023-07-18T19:10:58Z
Modified
2024-08-20T20:59:01.762410Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
1Panel command injection vulnerability in Firewall ip functionality
Details

Summary

An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Details

1Panel firewall functionality /hosts/firewall/ip endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands.

PoC

the payload ; sleep 3 # will lead server response in 3 seconds image

the payload ; sleep 6 # will lead server response in 6 seconds image

Impact

An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system.

Patches

The vulnerability has been fixed in v1.4.3.

Workarounds

It is recommended to upgrade the version to v1.4.3.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/1Panel-dev/1Panel Email us at wanghe@fit2cloud.com

Database specific
{
    "nvd_published_at": "2023-07-18T19:15:09Z",
    "cwe_ids": [
        "CWE-78"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-18T19:10:58Z"
}
References

Affected packages

Go / github.com/1Panel-dev/1Panel

Package

Name
github.com/1Panel-dev/1Panel
View open source insights on deps.dev
Purl
pkg:golang/github.com/1Panel-dev/1Panel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.3

Database specific

{
    "last_known_affected_version_range": "<= 1.4.2"
}