Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.
References
Link | Resource |
---|---|
https://blog.telspace.co.za/2020/06/pi-hole-code-injection-cve-2020-14971.html | Third Party Advisory |
https://github.com/pi-hole/AdminLTE/commit/8f6e1365b6dec0ae1aa0b0b15b102c9133f347e5 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/commit/c949516ee15fa6a9b0c8511cc4c4d6b0893f3e69 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/pull/1443 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-06-23 14:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-14971
Mitre link : CVE-2020-14971
CVE.ORG link : CVE-2020-14971
JSON object : View
Products Affected
pi-hole
- pi-hole
CWE
CWE-862
Missing Authorization