Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
PrivateBin's template-switching feature allows arbitrary local file inclusion through path traversal
Vulnerability Description
PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Starting in version 1.7.7 and prior to version 2.0.3, an unauthenticated Local File Inclusion exists in the template-switching feature. If `templateselection` is enabled in the configuration, the server trusts the `template` cookie and includes the referenced PHP file. An attacker can read sensitive data or, if they manage to drop a PHP file elsewhere, gain remote code execution. The constructed path of the template file is checked for existence, then included. For PrivateBin project files this does not leak any secrets due to data files being created with PHP code that prevents execution, but if a configuration file without that line got created or the visitor figures out the relative path to a PHP script that directly performs an action without appropriate privilege checking, those might execute or leak information. The issue has been patched in version 2.0.3. As a workaround, set `templateselection = false` (which is the default) in `cfg/conf.php` or remove it entirely
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Vulnerability Type
相对路径遍历
Vulnerability Title
PrivateBin 安全漏洞
Vulnerability Description
PrivateBin是PrivateBin项目的一个极简的开源在线粘贴箱。 PrivateBin 1.7.7版本至2.0.3之前版本存在安全漏洞,该漏洞源于模板切换功能存在本地文件包含,可能导致读取敏感数据或远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A