Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.
References
Link | Resource |
---|---|
https://blog.telspace.co.za/2020/06/pi-hole-code-injection-cve-2020-14971.html | Third Party Advisory |
https://github.com/pi-hole/AdminLTE/pull/1443 | Third Party Advisory |
https://github.com/pi-hole/AdminLTE/commit/8f6e1365b6dec0ae1aa0b0b15b102c9133f347e5 | Patch Third Party Advisory |
https://github.com/pi-hole/AdminLTE/commit/c949516ee15fa6a9b0c8511cc4c4d6b0893f3e69 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-06-23 07:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-14971
Mitre link : CVE-2020-14971
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
pi-hole
- pi-hole