1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts.
References
Configurations
History
11 Feb 2025, 17:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:* | |
References | () https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26 - Product | |
References | () https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f - Vendor Advisory | |
First Time |
Fit2cloud 1panel
Fit2cloud |
21 Nov 2024, 09:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26 - | |
References | () https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f - |
18 Apr 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-18 15:15
Updated : 2025-02-11 17:46
NVD link : CVE-2024-30257
Mitre link : CVE-2024-30257
CVE.ORG link : CVE-2024-30257
JSON object : View
Products Affected
fit2cloud
- 1panel
CWE
CWE-203
Observable Discrepancy