First published: Thu Aug 10 2023(Updated: )
### Summary Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. ### Details In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability ![picture1](https://user-images.githubusercontent.com/136411443/257109786-1b0af1e7-346f-4e92-9da2-d977f2f7fe6a.jpg) ### PoC Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below: ![微信图片_20230731112833](https://user-images.githubusercontent.com/136411443/257109931-108fc16f-e180-4d1e-996c-d9da5f76559f.png) ### Impact 1Panel v1.4.3
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud 1panel | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39964 is a vulnerability in 1Panel, an open source Linux server operation and maintenance management panel, that allows an attacker to read arbitrary important configuration files on the server.
CVE-2023-39964 has a severity score of 7.5, which is considered high.
To fix CVE-2023-39964, update to version 1.5.0 of 1Panel.