AdminLTE is a Pi-hole Dashboard for stats and configuration. In affected versions inserting code like `<script>alert("XSS")</script>` in the field marked with "Domain to look for" and hitting <kbd>enter</kbd> (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/pi-hole/AdminLTE/commit/b07372bd426ca8111824a0244dc89d07a7243509 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-cfr5-rqm5-9vhp | Third Party Advisory |
https://github.com/pi-hole/AdminLTE/commit/b07372bd426ca8111824a0244dc89d07a7243509 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-cfr5-rqm5-9vhp | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.5
v3 : 5.9 |
References | () https://github.com/pi-hole/AdminLTE/commit/b07372bd426ca8111824a0244dc89d07a7243509 - Patch, Third Party Advisory | |
References | () https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-cfr5-rqm5-9vhp - Third Party Advisory |
Information
Published : 2022-07-07 22:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-31029
Mitre link : CVE-2022-31029
CVE.ORG link : CVE-2022-31029
JSON object : View
Products Affected
pi-hole
- adminlte
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')