Description
Pi-hole through 5.0 allows code injection in piholedhcp (the Static DHCP Leases section) by modifying Teleporter backup files and then restoring them. This occurs in settings.php. To exploit this, an attacker would request a backup of limited files via teleporter.php. These are placed into a .tar.gz archive. The attacker then modifies the host parameter in dnsmasq.d files, and then compresses and uploads these files again.
References (4)
Core 4
Core References
Third Party Advisory x_refsource_misc
https://blog.telspace.co.za/2020/06/pi-hole-code-injection-cve-2020-14971.html
Third Party Advisory x_refsource_confirm
https://github.com/pi-hole/AdminLTE/pull/1443
Patch, Third Party Advisory x_refsource_confirm
https://github.com/pi-hole/AdminLTE/commit/c949516ee15fa6a9b0c8511cc4c4d6b0893f3e69
Patch, Third Party Advisory x_refsource_confirm
https://github.com/pi-hole/AdminLTE/commit/8f6e1365b6dec0ae1aa0b0b15b102c9133f347e5
Scores
CVSS v3
7.8
EPSS
0.0007
EPSS Percentile
20.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-862
Status
published
Products (1)
pi-hole/pi-hole
< 5.0
Published
Jun 23, 2020
Tracked Since
Feb 18, 2026