8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection
FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.
References
-
https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp x_refsource_CONFIRM
Affected products
- ==>= 6.0, < 6.6
Matching in nixpkgs
pkgs.swiftlint
A tool to enforce Swift style and conventions
pkgs.pihole-ftl
Pi-hole FTL engine
pkgs.python312Packages.softlayer
Python libraries that assist in calling the SoftLayer API
pkgs.python313Packages.softlayer
Python libraries that assist in calling the SoftLayer API
pkgs.python314Packages.softlayer
Python libraries that assist in calling the SoftLayer API
Package maintainers
-
@onny Jonas Heinrich <onny@project-insanity.org>
-
@matteo-pacini Matteo Pacini <m@matteopacini.me>
-
@DimitarNestorov Dimitar Nestorov <nix@dimitarnestorov.com>
-
@averyvigolo Avery Vigolo <nixpkgs@averyv.me>