CVE-2024-34352

1Panel is an open source Linux server operation and maintenance management panel. Prior to v1.10.3-lts, there are many command injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. The mirror configuration write symbol `>` can be used to achieve arbitrary file writing. This vulnerability is fixed in v1.10.3-lts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*

History

07 Feb 2025, 02:44

Type Values Removed Values Added
First Time Fit2cloud
Fit2cloud 1panel
References () https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 - () https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847 - Exploit, Vendor Advisory
CPE cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*

Information

Published : 2024-05-14 15:38

Updated : 2025-02-07 02:44


NVD link : CVE-2024-34352

Mitre link : CVE-2024-34352

CVE.ORG link : CVE-2024-34352


JSON object : View

Products Affected

fit2cloud

  • 1panel
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')