Vulnerabilites related to 1Panel-dev - 1Panel
CVE-2023-36458 (GCVE-0-2023-36458)
Vulnerability from cvelistv5
Published
2023-07-05 20:57
Modified
2024-10-18 19:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: , 1.3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:45:56.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36458", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:34:26.752374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:36:17.850Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": ", 1.3.6" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payloads to achieve command injection when entering the container terminal. The vulnerability has been fixed in v1.3.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T20:57:19.130Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7x2c-fgx6-xf9h" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6" } ], "source": { "advisory": "GHSA-7x2c-fgx6-xf9h", "discovery": "UNKNOWN" }, "title": "1Panel vulnerable to ommand injection when entering the container terminal" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36458", "datePublished": "2023-07-05T20:57:19.130Z", "dateReserved": "2023-06-21T18:50:41.699Z", "dateUpdated": "2024-10-18T19:36:17.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30257 (GCVE-0-2024-30257)
Vulnerability from cvelistv5
Published
2024-04-18 14:56
Modified
2024-08-02 01:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-203 - Observable Discrepancy
Summary
1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 1.10.3-lts |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:1.10.2:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "status": "affected", "version": "1.10.2" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-30257", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-22T20:39:26.418603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:38:59.303Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:05.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f" }, { "name": "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 1.10.3-lts" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203: Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-18T14:56:56.270Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f" }, { "name": "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26" } ], "source": { "advisory": "GHSA-6m9h-2pr2-9j8f", "discovery": "UNKNOWN" }, "title": "1Panel\u0027s password verification is suspected to have a timing attack vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-30257", "datePublished": "2024-04-18T14:56:56.270Z", "dateReserved": "2024-03-26T12:52:00.934Z", "dateUpdated": "2024-08-02T01:32:05.409Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24768 (GCVE-0-2024-24768)
Vulnerability from cvelistv5
Published
2024-02-05 15:07
Modified
2025-06-17 21:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-315 - Cleartext Storage of Sensitive Information in a Cookie
Summary
1Panel is an open source Linux server operation and maintenance management panel. The HTTPS cookie that comes with the panel does not have the Secure keyword, which may cause the cookie to be sent in plain text if accessed using HTTP. This issue has been patched in version 1.9.6.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: <= 1.9.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h" }, { "name": "https://github.com/1Panel-dev/1Panel/pull/3817", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/pull/3817" }, { "name": "https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-24768", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-13T19:56:02.818174Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-17T21:29:25.811Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c= 1.9.5" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. The HTTPS cookie that comes with the panel does not have the Secure keyword, which may cause the cookie to be sent in plain text if accessed using HTTP. This issue has been patched in version 1.9.6.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-315", "description": "CWE-315: Cleartext Storage of Sensitive Information in a Cookie", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-05T15:07:41.738Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-9xfw-jjq2-7v8h" }, { "name": "https://github.com/1Panel-dev/1Panel/pull/3817", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/pull/3817" }, { "name": "https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/commit/1169648162c4b9b48e0b4aa508f9dea4d6bc50d5" } ], "source": { "advisory": "GHSA-9xfw-jjq2-7v8h", "discovery": "UNKNOWN" }, "title": "1Panel set-cookie is missing the Secure keyword" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24768", "datePublished": "2024-02-05T15:07:41.738Z", "dateReserved": "2024-01-29T20:51:26.013Z", "dateUpdated": "2025-06-17T21:29:25.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39965 (GCVE-0-2023-39965)
Vulnerability from cvelistv5
Published
2023-08-10 17:42
Modified
2024-10-04 18:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. Attackers can freely download the file content on the target system. This may cause a large amount of information leakage. Version 1.5.0 has a patch for this issue.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: = 1.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.152Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:1.4.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "status": "affected", "version": "1.4.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39965", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:15:39.961454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:57:04.477Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "= 1.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. Attackers can freely download the file content on the target system. This may cause a large amount of information leakage. Version 1.5.0 has a patch for this issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:42:05.793Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "source": { "advisory": "GHSA-85cf-gj29-f555", "discovery": "UNKNOWN" }, "title": "1Panel Unauthorized access in Backend" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39965", "datePublished": "2023-08-10T17:42:05.793Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-04T18:57:04.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-37477 (GCVE-0-2023-37477)
Vulnerability from cvelistv5
Published
2023-07-18 18:25
Modified
2024-10-18 17:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
1Panel is an open source Linux server operation and maintenance management panel. An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. This issue has been addressed in commit `e17b80cff49` which is included in release version `1.4.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 1.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:30.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5" }, { "name": "https://github.com/1Panel-dev/1Panel/commit/e17b80cff4975ee343568ff526b62319f499005d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/commit/e17b80cff4975ee343568ff526b62319f499005d" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.4.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37477", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T16:06:31.577131Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T17:22:22.643Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 1.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. An OS command injection vulnerability exists in 1Panel firewall functionality. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. 1Panel firewall functionality `/hosts/firewall/ip` endpoint read user input without validation, the attacker extends the default functionality of the application, which execute system commands. An attacker can execute arbitrary code on the target system, which can lead to a complete compromise of the system. This issue has been addressed in commit `e17b80cff49` which is included in release version `1.4.3`. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-18T18:25:53.691Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5" }, { "name": "https://github.com/1Panel-dev/1Panel/commit/e17b80cff4975ee343568ff526b62319f499005d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/commit/e17b80cff4975ee343568ff526b62319f499005d" } ], "source": { "advisory": "GHSA-p9xf-74xh-mhw5", "discovery": "UNKNOWN" }, "title": "Command injection in firewall ip functionality in 1Panel" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37477", "datePublished": "2023-07-18T18:25:53.691Z", "dateReserved": "2023-07-06T13:01:36.999Z", "dateUpdated": "2024-10-18T17:22:22.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-27288 (GCVE-0-2024-27288)
Vulnerability from cvelistv5
Published
2024-03-06 18:23
Modified
2024-08-27 16:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.10.1-lts, users can use Burp to obtain unauthorized access to the console page. The vulnerability has been fixed in v1.10.1-lts. There are no known workarounds.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 1.10.1-lts |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T00:28:00.342Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.10.1-lts", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-27288", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-27T16:50:21.682289Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T16:52:53.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 1.10.1-lts" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.10.1-lts, users can use Burp to obtain unauthorized access to the console page. The vulnerability has been fixed in v1.10.1-lts. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-06T18:23:50.053Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts" } ], "source": { "advisory": "GHSA-26w3-q4j8-4xjp", "discovery": "UNKNOWN" }, "title": "1Panel open source panel project has an unauthorized vulnerability." } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-27288", "datePublished": "2024-03-06T18:23:50.053Z", "dateReserved": "2024-02-22T18:08:38.873Z", "dateUpdated": "2024-08-27T16:52:53.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34352 (GCVE-0-2024-34352)
Vulnerability from cvelistv5
Published
2024-05-09 14:38
Modified
2024-08-02 02:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
1Panel is an open source Linux server operation and maintenance management panel. Prior to v1.10.3-lts, there are many command injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. The mirror configuration write symbol `>` can be used to achieve arbitrary file writing. This vulnerability is fixed in v1.10.3-lts.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: <= v1.10.2-lts |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.10.3-lts", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34352", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-09T19:21:25.783196Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T13:03:33.875Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:51:10.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c= v1.10.2-lts" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. Prior to v1.10.3-lts, there are many command injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. The mirror configuration write symbol `\u003e` can be used to achieve arbitrary file writing. This vulnerability is fixed in v1.10.3-lts." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-09T14:38:19.241Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847" } ], "source": { "advisory": "GHSA-f8ch-w75v-c847", "discovery": "UNKNOWN" }, "title": "Arbitrary file write vulnerability in 1Panel " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-34352", "datePublished": "2024-05-09T14:38:19.241Z", "dateReserved": "2024-05-02T06:36:32.438Z", "dateUpdated": "2024-08-02T02:51:10.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39907 (GCVE-0-2024-39907)
Vulnerability from cvelistv5
Published
2024-07-18 15:31
Modified
2024-08-02 04:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: >= 1.10.9-tls, < 1.10.12-tls |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.10.12-lts", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39907", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T19:36:35.882647Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T13:02:34.659Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-5grx-v727-qmq6", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-5grx-v727-qmq6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003e= 1.10.9-tls, \u003c 1.10.12-tls" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-18T15:31:30.892Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-5grx-v727-qmq6", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-5grx-v727-qmq6" } ], "source": { "advisory": "GHSA-5grx-v727-qmq6", "discovery": "UNKNOWN" }, "title": "a sqlinjection in 1Panel " } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39907", "datePublished": "2024-07-18T15:31:30.892Z", "dateReserved": "2024-07-02T19:37:18.600Z", "dateUpdated": "2024-08-02T04:33:11.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-54424 (GCVE-0-2025-54424)
Vulnerability from cvelistv5
Published
2025-08-01 23:04
Modified
2025-08-04 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server. In versions 2.0.5 and below, the HTTPS protocol used for communication between the Core and Agent endpoints has incomplete certificate verification during certificate validation, leading to unauthorized interface access. Due to the presence of numerous command execution or high-privilege interfaces in 1Panel, this results in Remote Code Execution (RCE). This is fixed in version 2.0.6. The CVE has been translated from Simplified Chinese using GitHub Copilot.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 2.0.6 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54424", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-04T14:17:57.703060Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-04T14:18:25.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 2.0.6" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is a web interface and MCP Server that manages websites, files, containers, databases, and LLMs on a Linux server. In versions 2.0.5 and below, the HTTPS protocol used for communication between the Core and Agent endpoints has incomplete certificate verification during certificate validation, leading to unauthorized interface access. Due to the presence of numerous command execution or high-privilege interfaces in 1Panel, this results in Remote Code Execution (RCE). This is fixed in version 2.0.6. The CVE has been translated from Simplified Chinese using GitHub Copilot." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T23:04:38.142Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-8j63-96wh-wh3j" }, { "name": "https://github.com/1Panel-dev/1Panel/pull/9698/commits/4003284521f8d31ddaf7215d1c30ab8b4cdb0261", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/pull/9698/commits/4003284521f8d31ddaf7215d1c30ab8b4cdb0261" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v2.0.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v2.0.6" } ], "source": { "advisory": "GHSA-8j63-96wh-wh3j", "discovery": "UNKNOWN" }, "title": "1Panel Agent Bypasses Certificate Verification Leading to Arbitrary Command Execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54424", "datePublished": "2025-08-01T23:04:38.142Z", "dateReserved": "2025-07-21T23:18:10.281Z", "dateUpdated": "2025-08-04T14:18:25.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39964 (GCVE-0-2023-39964)
Vulnerability from cvelistv5
Published
2023-08-10 17:39
Modified
2024-10-04 18:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the `api/v1/file.go` file, there is a function called `LoadFromFile`, which directly reads the file by obtaining the requested path `parameter[path]`. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: = 1.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:1.4.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "status": "affected", "version": "1.4.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39964", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:15:58.042150Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:57:45.505Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "= 1.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the `api/v1/file.go` file, there is a function called `LoadFromFile`, which directly reads the file by obtaining the requested path `parameter[path]`. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:39:11.768Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "source": { "advisory": "GHSA-pv7q-v9mv-9mh5", "discovery": "UNKNOWN" }, "title": "1Panel O\u0026M management panel has a background arbitrary file reading vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39964", "datePublished": "2023-08-10T17:39:11.768Z", "dateReserved": "2023-08-07T16:27:27.076Z", "dateUpdated": "2024-10-04T18:57:45.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39911 (GCVE-0-2024-39911)
Vulnerability from cvelistv5
Published
2024-07-18 15:35
Modified
2025-02-13 17:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
1Panel is a web-based linux server management control panel. 1Panel contains an unspecified sql injection via User-Agent handling. This issue has been addressed in version 1.10.12-lts. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 1.10.12-lts |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.10.2-lts", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39911", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T16:53:09.884480Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T13:01:53.003Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7m53-pwp6-v3f5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7m53-pwp6-v3f5" }, { "tags": [ "x_transferred" ], "url": "https://blog.mo60.cn/index.php/archives/1Panel_SQLinjection2Rce.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 1.10.12-lts" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is a web-based linux server management control panel. 1Panel contains an unspecified sql injection via User-Agent handling. This issue has been addressed in version 1.10.12-lts. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-18T15:40:13.412Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7m53-pwp6-v3f5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-7m53-pwp6-v3f5" }, { "url": "https://blog.mo60.cn/index.php/archives/1Panel_SQLinjection2Rce.html" } ], "source": { "advisory": "GHSA-7m53-pwp6-v3f5", "discovery": "UNKNOWN" }, "title": "1Panel SQL injection" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39911", "datePublished": "2024-07-18T15:35:15.584Z", "dateReserved": "2024-07-02T19:37:18.601Z", "dateUpdated": "2025-02-13T17:53:20.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39966 (GCVE-0-2023-39966)
Vulnerability from cvelistv5
Published
2023-08-10 17:46
Modified
2024-10-04 18:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, an arbitrary file write vulnerability could lead to direct control of the server. In the `api/v1/file.go` file, there is a function called `SaveContentthat,It `recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations. Version 1.5.0 contains a patch for this issue.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: = 1.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:18:10.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:1.4.3:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "status": "affected", "version": "1.4.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-39966", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T18:15:22.442783Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T18:56:18.054Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "= 1.4.3" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, an arbitrary file write vulnerability could lead to direct control of the server. In the `api/v1/file.go` file, there is a function called `SaveContentthat,It `recieves JSON data sent by users in the form of a POST request. And the lack of parameter filtering allows for arbitrary file write operations. Version 1.5.0 contains a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-10T17:46:21.104Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-hf7j-xj3w-87g4" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0" } ], "source": { "advisory": "GHSA-hf7j-xj3w-87g4", "discovery": "UNKNOWN" }, "title": "1Panel arbitrary file write vulnerability exists in the background" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39966", "datePublished": "2023-08-10T17:46:21.104Z", "dateReserved": "2023-08-07T16:27:27.077Z", "dateUpdated": "2024-10-04T18:56:18.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-36457 (GCVE-0-2023-36457)
Vulnerability from cvelistv5
Published
2023-07-05 20:57
Modified
2024-10-18 19:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories. The vulnerability has been fixed in v1.3.6.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
1Panel-dev | 1Panel |
Version: < 1.3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:45:56.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "1panel", "vendor": "fit2cloud", "versions": [ { "lessThan": "1.3.6", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-36457", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-18T19:32:09.589552Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-18T19:33:33.395Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "1Panel", "vendor": "1Panel-dev", "versions": [ { "status": "affected", "version": "\u003c 1.3.6" } ] } ], "descriptions": [ { "lang": "en", "value": "1Panel is an open source Linux server operation and maintenance management panel. Prior to version 1.3.6, an authenticated attacker can craft a malicious payload to achieve command injection when adding container repositories. The vulnerability has been fixed in v1.3.6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-05T20:57:23.640Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-q2mx-gpjf-3h8x" }, { "name": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/1Panel-dev/1Panel/releases/tag/v1.3.6" } ], "source": { "advisory": "GHSA-q2mx-gpjf-3h8x", "discovery": "UNKNOWN" }, "title": "1Panel vulnerable to command injection when adding container repositories" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-36457", "datePublished": "2023-07-05T20:57:23.640Z", "dateReserved": "2023-06-21T18:50:41.699Z", "dateUpdated": "2024-10-18T19:33:33.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }