8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package swiftlint
- @LeSuisse removed package python312Packages.softlayer
- @LeSuisse removed package python313Packages.softlayer
- @LeSuisse removed package python314Packages.softlayer
- @LeSuisse removed package chickenPackages_5.chickenEggs.ftl
- @LeSuisse accepted
- @LeSuisse published on GitHub
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
References
-
https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp x_refsource_CONFIRM
Affected products
- ==>= 6.0, < 6.6
Matching in nixpkgs
Ignored packages (5)
pkgs.swiftlint
A tool to enforce Swift style and conventions
pkgs.python312Packages.softlayer
Python libraries that assist in calling the SoftLayer API
pkgs.python313Packages.softlayer
Python libraries that assist in calling the SoftLayer API
pkgs.python314Packages.softlayer
Python libraries that assist in calling the SoftLayer API
Package maintainers
-
@averyvigolo Avery Vigolo <nixpkgs@averyv.me>