First published: Fri Jul 21 2023(Updated: )
### Summary http://kube.pi/kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password of any user (including admin). This leads to password crack attack ### PoC https://drive.google.com/file/d/1ksdawJ1vShRJyT3wAgpqVmz-Ls6hMA7M/preview ### Impact - Leaking confidential information. - Can lead to password cracking attacks
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Kubepi | <1.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37916 is a vulnerability in KubePi that allows an attacker to leak password hashes of any user, including the admin.
An attacker can exploit CVE-2023-37916 by accessing the endpoint /kubepi/api/v1/users/search?pageNum=1&&pageSize=10 and retrieve the password hashes.
CVE-2023-37916 has a severity rating of 7.5, which is considered high.
To fix CVE-2023-37916, update KubePi to version 1.6.5 or higher.
Yes, you can refer to the following resources for more information: [GitHub Security Advisory](https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h), [Google Drive Preview](https://drive.google.com/file/d/1ksdawJ1vShRJyT3wAgpqVmz-Ls6hMA7M/preview), [KubePi Release Tag (v1.6.5)](https://github.com/1Panel-dev/KubePi/releases/tag/v1.6.5)