1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, an arbitrary file write vulnerability could lead to direct control of the server. In the `api/v1/file.go` file, there is a function called `SaveContentthat,It `recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations. Version 1.5.0 contains a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | Product Release Notes |
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4 | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-08-10T17:46:21.104Z
Updated: 2023-08-10T17:46:21.104Z
Reserved: 2023-08-07T16:27:27.077Z
Link: CVE-2023-39966
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-08-10T18:15:11.550
Modified: 2023-09-08T16:56:24.123
Link: CVE-2023-39966
JSON object: View
Redhat Information
No data.
CWE