1Panel O&M management panel has a background arbitrary file reading vulnerability
Description
Published by the National Vulnerability Database
Aug 10, 2023
Published to the GitHub Advisory Database
Aug 10, 2023
Reviewed
Aug 10, 2023
Last updated
Nov 12, 2023
Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability
PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:
Impact
1Panel v1.4.3
References