Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
1Panel v1.4.3
{ "nvd_published_at": "2023-08-10T18:15:11Z", "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-08-10T20:09:07Z" }