Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-2352", "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "state": "PUBLISHED", "assignerShortName": "VulDB", "dateReserved": "2024-03-09T06:56:47.141Z", "datePublished": "2024-03-10T01:31:05.215Z", "dateUpdated": "2024-08-12T18:09:02.319Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB", "dateUpdated": "2024-03-10T01:31:05.215Z"}, "title": "1Panel swap baseApi.UpdateDeviceSwap command injection", "problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-77", "lang": "en", "description": "CWE-77 Command Injection"}]}], "affected": [{"vendor": "n/a", "product": "1Panel", "versions": [{"version": "1.10.1-lts", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability, which was classified as critical, has been found in 1Panel up to 1.10.1-lts. Affected by this issue is the function baseApi.UpdateDeviceSwap of the file /api/v1/toolbox/device/update/swap. The manipulation of the argument Path with the input 123123123\\nopen -a Calculator leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-256304."}, {"lang": "de", "value": "Eine kritische Schwachstelle wurde in 1Panel bis 1.10.1-lts entdeckt. Hierbei geht es um die Funktion baseApi.UpdateDeviceSwap der Datei /api/v1/toolbox/device/update/swap. Durch Manipulation des Arguments Path mit der Eingabe 123123123\\nopen -a Calculator mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Als bestm\u00f6gliche Massnahme wird Patching empfohlen."}], "metrics": [{"cvssV3_1": {"version": "3.1", "baseScore": 6.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV3_0": {"version": "3.0", "baseScore": 6.3, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "baseSeverity": "MEDIUM"}}, {"cvssV2_0": {"version": "2.0", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "timeline": [{"time": "2024-03-09T00:00:00.000Z", "lang": "en", "value": "Advisory disclosed"}, {"time": "2024-03-09T01:00:00.000Z", "lang": "en", "value": "VulDB entry created"}, {"time": "2024-03-09T08:04:10.000Z", "lang": "en", "value": "VulDB entry last update"}], "credits": [{"lang": "en", "value": "linyz-tel (VulDB User)", "type": "reporter"}], "references": [{"url": "https://vuldb.com/?id.256304", "name": "VDB-256304 | 1Panel swap baseApi.UpdateDeviceSwap command injection", "tags": ["vdb-entry", "technical-description"]}, {"url": "https://vuldb.com/?ctiid.256304", "name": "VDB-256304 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": ["signature", "permissions-required"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131", "tags": ["issue-tracking"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131#issue-2176105990", "tags": ["exploit", "issue-tracking"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131/commits/0edd7a9f6f5100aab98a0ea6e5deedff7700396c", "tags": ["issue-tracking", "patch"]}]}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T19:11:53.513Z"}, "title": "CVE Program Container", "references": [{"url": "https://vuldb.com/?id.256304", "name": "VDB-256304 | 1Panel swap baseApi.UpdateDeviceSwap command injection", "tags": ["vdb-entry", "technical-description", "x_transferred"]}, {"url": "https://vuldb.com/?ctiid.256304", "name": "VDB-256304 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": ["signature", "permissions-required", "x_transferred"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131", "tags": ["issue-tracking", "x_transferred"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131#issue-2176105990", "tags": ["exploit", "issue-tracking", "x_transferred"]}, {"url": "https://github.com/1Panel-dev/1Panel/pull/4131/commits/0edd7a9f6f5100aab98a0ea6e5deedff7700396c", "tags": ["issue-tracking", "patch", "x_transferred"]}]}, {"affected": [{"vendor": "fit2cloud", "product": "1panel", "cpes": ["cpe:2.3:a:fit2cloud:1panel:1.10.1:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1.10.1", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-08-12T15:20:24.448783Z", "id": "CVE-2024-2352", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-12T18:09:02.319Z"}}]}}