CVE-2023-39964
1Panel is an open source Linux server operation and maintenance management panel. In version 1.4.3, arbitrary file reads allow an attacker to read arbitrary important configuration files on the server. In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability. Version 1.5.0 has a patch for this issue.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/1Panel-dev/1Panel/releases/tag/v1.5.0, https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-pv7q-v9mv-9mh5, https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39964.json, https://nvd.nist.gov/vuln/detail/CVE-2023-39964
