CVE-2022-23513

Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:adminlte:*:*:*:*:*:*:*:*

History

11 Apr 2025, 14:48

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html - () http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html - Exploit

13 Feb 2025, 17:15

Type Values Removed Values Added
Summary (en) Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists. (en) Pi-Hole is a network-wide ad blocking via your own Linux hardware, AdminLTE is a Pi-hole Dashboard for stats and more. In case of an attack, the threat actor will obtain the ability to perform an unauthorized query for blocked domains on `queryads` endpoint. In the case of application, this vulnerability exists because of a lack of validation in code on a root server path: `/admin/scripts/pi-hole/phpqueryads.php.` Potential threat actor(s) are able to perform an unauthorized query search in blocked domain lists. This could lead to the disclosure for any victims' personal blacklists.

21 Nov 2024, 06:48

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html - () http://packetstormsecurity.com/files/174460/AdminLTE-PiHole-Broken-Access-Control.html -
References () https://github.com/pi-hole/AdminLTE/releases/tag/v5.18 - Release Notes, Third Party Advisory () https://github.com/pi-hole/AdminLTE/releases/tag/v5.18 - Release Notes, Third Party Advisory
References () https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 - Exploit, Third Party Advisory () https://github.com/pi-hole/AdminLTE/security/advisories/GHSA-6qh8-6rrj-7497 - Exploit, Third Party Advisory
Summary
  • (es) Pi-Hole es un bloqueador de anuncios en toda la red a través de su propio hardware Linux, AdminLTE es un panel de Pi-hole para estadísticas y más. En caso de un ataque, el actor de la amenaza obtendrá la capacidad de realizar una consulta no autorizada para dominios bloqueados en el endpoint ""queryads"". En el caso de la aplicación, esta vulnerabilidad existe debido a una falta de validación en el código en la ruta del servidor raíz: `/admin/scripts/pi-hole/phpqueryads.php.` Los potenciales actores de amenazas pueden realizar una Búsqueda de consultas no autorizadas en listas de dominios bloqueados. Esto podría dar lugar a la divulgación de las listas negras personales de las víctimas.

Information

Published : 2022-12-23 00:15

Updated : 2025-04-11 14:48


NVD link : CVE-2022-23513

Mitre link : CVE-2022-23513

CVE.ORG link : CVE-2022-23513


JSON object : View

Products Affected

pi-hole

  • adminlte
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo