1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, authenticated attackers can download arbitrary files through the API interface. This code has unauthorized access. Attackers can freely download the file content on the target system. This may cause a large amount of information leakage. Version 1.5.0 has a patch for this issue.
References
Link | Resource |
---|---|
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | Product Release Notes |
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 | Exploit Vendor Advisory |
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 | Product Release Notes |
https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 08:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 - Product, Release Notes | |
References | () https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 - Exploit, Vendor Advisory |
08 Sep 2023, 16:56
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fit2cloud 1panel
Fit2cloud |
|
CPE | cpe:2.3:a:fit2cloud:1panel:1.4.3:*:*:*:*:*:*:* |
16 Aug 2023, 18:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-85cf-gj29-f555 - Exploit, Vendor Advisory | |
References | (MISC) https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0 - Product, Release Notes | |
CPE | cpe:2.3:a:1panel:1panel:1.4.3:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
1panel 1panel
1panel |
10 Aug 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-10 18:15
Updated : 2024-11-21 08:16
NVD link : CVE-2023-39965
Mitre link : CVE-2023-39965
CVE.ORG link : CVE-2023-39965
JSON object : View
Products Affected
fit2cloud
- 1panel
CWE
CWE-863
Incorrect Authorization