
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-32560 is a Local File Read vulnerability discovered in OctoPrint before version 1.6.0. The vulnerability allows authenticated users to read arbitrary files from the system by manipulating the logging path configuration (Brzozowski Blog).
The vulnerability exists in OctoPrint's logging functionality where authenticated users can specify custom paths for log files. By changing the log folder to any readable directory on the system (e.g., ~/.ssh/), an attacker could list and download all files in that directory. The application does not properly validate or restrict the log file paths, allowing access to sensitive system files (Brzozowski Blog).
An authenticated attacker could exploit this vulnerability to read sensitive files from the system, including SSH private keys and other configuration files. This could lead to unauthorized access to system credentials and potentially enable persistent access to the affected system (Brzozowski Blog).
The vulnerability was patched in OctoPrint version 1.6.0. Users should upgrade to this version or later. Additionally, it is recommended to never expose OctoPrint interfaces directly to the internet. If remote access is required, implement VPN access with strong security controls (Brzozowski Blog, OctoPrint Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."