Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/pi-hole/AdminLTE/commits/master | third party advisory patch |
http://packetstormsecurity.com/files/157861/Pi-Hole-4.3.2-DHCP-MAC-OS-Command-Execution.html | third party advisory vdb entry |
https://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution/ | third party advisory exploit |
https://twitter.com/Nate_Kappa/status/1243900213665902592?s=20 | press/media coverage |
https://github.com/pi-hole/AdminLTE/releases/tag/v4.3.3 | third party advisory release notes |
https://github.com/pi-hole/AdminLTE/pull/1165 | third party advisory patch |
http://packetstormsecurity.com/files/158737/Pi-hole-4.3.2-Remote-Code-Execution.html | third party advisory vdb entry |