Description
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9jxw-cfrh-jxq6 | Cachet vulnerable to new line injection during configuration edition |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T01:58:18.282Z
Reserved: 2021-08-16T00:00:00.000Z
Link: CVE-2021-39172
No data.
Status : Modified
Published: 2021-08-27T23:15:06.900
Modified: 2024-11-21T06:18:47.260
Link: CVE-2021-39172
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA