Arbitrary Command Injection Affecting github.com/1panel-dev/1panel/backend/utils/cmd package, versions <1.10.1-lts
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOM1PANELDEV1PANELBACKENDUTILSCMD-6421867
- published 12 Mar 2024
- disclosed 10 Mar 2024
- credit L1nyz-tel
Introduced: 10 Mar 2024
CVE-2024-2352 Open this link in a new tabHow to fix?
Upgrade github.com/1Panel-dev/1Panel/backend/utils/cmd
to version 1.10.1-lts or higher.
Overview
Affected versions of this package are vulnerable to Arbitrary Command Injection due to improper validation of user-supplied input in the baseApi.UpdateDeviceSwap
function of the /api/v1/toolbox/device/update/swap
file. An attacker can execute arbitrary commands on the system by manipulating the Path
argument with specially crafted input.
References
CVSS Scores
version 3.1