cve/2023/CVE-2023-37916.md

18 lines
979 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-37916](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37916)
![](https://img.shields.io/static/v1?label=Product&message=KubePi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%201.6.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
KubePi is an opensource kubernetes management panel. The endpoint /kubepi/api/v1/users/search?pageNum=1&&pageSize=10 leak password hash of any user (including admin). A sufficiently motivated attacker may be able to crack leaded password hashes. This issue has been addressed in version 1.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
### POC
#### Reference
- https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-87f6-8gr7-pc6h
#### Github
No PoCs found on GitHub currently.