Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg4ZjktN3h4aC1jNjg4

Cachet configuration leak

Impact

Authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (APP_KEY) and various passwords (email, database, etc).

Patches

This issue was addressed by improving UpdateConfigCommandHandler and preventing the use of nested variables in the resulting dotenv configuration file.

Workarounds

Only allow trusted source IP addresses to access to the administration dashboard.

References

Further technical details are available at https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection.

For more information

If you have any questions or comments about this advisory, you can contact:

Permalink: https://github.com/advisories/GHSA-88f9-7xxh-c688
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg4ZjktN3h4aC1jNjg4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: almost 2 years ago


CVSS Score: 8.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Identifiers: GHSA-88f9-7xxh-c688, CVE-2021-39174
References: Repository: https://github.com/fiveai/Cachet
Blast Radius: 7.4

Affected Packages

packagist:cachethq/cachet
Dependent packages: 2
Dependent repositories: 7
Downloads: 393 total
Affected Version Ranges: <= 2.5.0
Fixed in: 2.5.1
All affected versions: 1.0.0, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.3.0, 2.3.1, 2.3.2, 2.3.3, 2.3.4, 2.3.5, 2.3.6, 2.3.7, 2.3.8, 2.3.9, 2.3.10, 2.3.11, 2.3.12, 2.3.13, 2.3.14, 2.3.15, 2.3.16, 2.3.17, 2.3.18, 2.4.0, 2.4.1
All unaffected versions: