First published: Mon Feb 05 2024(Updated: )
### Summary The https cookie that comes with the panel does not have the Secure keyword, which may cause the cookie to be sent in plain text when accessing http accidentally. https://developer.mozilla.org/zh-CN/docs/Web/HTTP/Headers/Set-Cookie#secure ### PoC Directly configure https for the panel, and then capture the packet when logging in again and find that the cookie does not have the Secure keyword ### Impact Everyone who has configured the panel https
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/1Panel-dev/1Panel | <=1.9.5 | 1.9.6 |
Fit2cloud 1panel | =1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24768 is considered a moderate severity vulnerability due to the potential exposure of sensitive information in cookies.
To fix CVE-2024-24768, upgrade to version 1.9.6 or later of the affected software package.
CVE-2024-24768 affects the 1Panel software, specifically version 1.9.5 and earlier.
The absence of the Secure keyword in cookies may allow them to be transmitted over unencrypted HTTP, exposing them to potential interception.
Yes, a Proof of Concept for CVE-2024-24768 involves improperly configuring HTTP that may lead to cookie exposure.