Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
Impact
1Panel v1.4.3
Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
Impact
1Panel v1.4.3