Vulnerability CVE-2021-32706


Published: 2021-08-04

Description:
Pi-hole's Web interface provides a central location to manage a Pi-hole instance and review performance statistics. Prior to Pi-hole Web interface version 5.5.1, the `validDomainWildcard` preg_match filter allows a malicious character through that can be used to execute code, list directories, and overwrite sensitive files. The issue lies in the fact that one of the periods is not escaped, allowing any character to be used in its place. A patch for this vulnerability was released in version 5.5.1.

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Pi-hole -> Pi-hole 

 References:
https://github.com/pi-hole/AdminLTE/releases/tag/v5.5.1
https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-5cm9-6p3m-v259

Copyright 2024, cxsecurity.com

 

Back to Top