Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.
References
Link | Resource |
---|---|
https://github.com/pi-hole/AdminLTE/releases/tag/v5.18 | Release Notes Third Party Advisory |
https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-12-22 16:15
Updated : 2022-12-30 13:50
NVD link : CVE-2022-23513
Mitre link : CVE-2022-23513
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
pi-hole
- adminlte