First published: Fri Jul 21 2023(Updated: )
### Summary A normal user has permission to create/update users, they can become admin by editing the `isadmin` value in the request ### PoC Change the value of the `isadmin` field in the request to true: https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/preview ### Impact Elevate user privileges
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Kubepi | <1.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37917 is a vulnerability in KubePi, an opensource Kubernetes management panel, that allows a normal user to become an admin by editing the 'isadmin' value in the request.
A user can exploit CVE-2023-37917 by creating or updating users and changing the 'isadmin' value to gain administrative control of KubePi.
CVE-2023-37917 has a severity rating of critical with a value of 9 out of 10.
You can fix CVE-2023-37917 by updating KubePi to version 1.6.5, which addresses the vulnerability.
You can find more information about CVE-2023-37917 in the following references: - [GitHub Security Advisory](https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-757p-vx43-fp9r) - [Google Drive File](https://drive.google.com/file/d/1e8XJbIFIDXaFiL-dqn0a0b6u7o3CwqSG/preview) - [KubePi Release Tag](https://github.com/1Panel-dev/KubePi/releases/tag/v1.6.5)