Description
A vulnerability, which was classified as critical, has been found in 1Panel up to 1.10.1-lts. Affected by this issue is the function baseApi.UpdateDeviceSwap of the file /api/v1/toolbox/device/update/swap. The manipulation of the argument Path with the input 123123123\nopen -a Calculator leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-256304.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1032 | A vulnerability, which was classified as critical, has been found in 1Panel up to 1.10.1-lts. Affected by this issue is the function baseApi.UpdateDeviceSwap of the file /api/v1/toolbox/device/update/swap. The manipulation of the argument Path with the input 123123123\nopen -a Calculator leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-256304. |
Github GHSA |
GHSA-x2vg-5wrf-vj6v | 1Panel is vulnerable to command injection |
References
History
Wed, 05 Feb 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fit2cloud
Fit2cloud 1panel |
|
| CPEs | cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fit2cloud
Fit2cloud 1panel |
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-12T18:09:02.319Z
Reserved: 2024-03-09T06:56:47.141Z
Link: CVE-2024-2352
Updated: 2024-08-01T19:11:53.513Z
Status : Analyzed
Published: 2024-03-10T02:16:08.767
Modified: 2025-02-05T13:55:32.650
Link: CVE-2024-2352
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA