Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability

PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:

Impact
1Panel v1.4.3
Summary
Arbitrary file reads allow an attacker to read arbitrary important configuration files on the server.
Details
In the api/v1/file.go file, there is a function called LoadFromFile, which directly reads the file by obtaining the requested path parameter[path]. The request parameters are not filtered, resulting in a background arbitrary file reading vulnerability

PoC
Request /api/v1/files/loadfile, carry /etc/passwd data to read, as shown below:

Impact
1Panel v1.4.3