AdminLTE is a Pi-hole Dashboard for stats and configuration. In affected versions inserting code like `<script>alert("XSS")</script>` in the field marked with "Domain to look for" and hitting <kbd>enter</kbd> (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/pi-hole/AdminLTE/commit/b07372bd426ca8111824a0244dc89d07a7243509 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-cfr5-rqm5-9vhp | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-07-07 22:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-31029
Mitre link : CVE-2022-31029
CVE.ORG link : CVE-2022-31029
JSON object : View
Products Affected
pi-hole
- adminlte
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')