Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-25016

Опубликовано: 28 янв. 2021
Источник: debian
EPSS Низкий

Описание

In OpenDoas from 6.6 to 6.8 the users PATH variable was incorrectly inherited by authenticated executions if the authenticating rule allowed the user to execute any command. Rules that only allowed to authenticated user to execute specific commands were not affected by this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
doasnot-affectedpackage

Примечания

  • Introduced in: https://github.com/Duncaen/OpenDoas/commit/01c658f8c45cb92a343be5f32aa6da70b2032168 (v6.6)

  • Fixed by: https://github.com/Duncaen/OpenDoas/commit/d5acd52e2a15c36a8e06f9103d35622933aa422d (v6.8.1)

  • https://github.com/Duncaen/OpenDoas/issues/45

EPSS

Процентиль: 77%
0.01024
Низкий

Связанные уязвимости

CVSS3: 8.8
nvd
около 5 лет назад

In OpenDoas from 6.6 to 6.8 the users PATH variable was incorrectly inherited by authenticated executions if the authenticating rule allowed the user to execute any command. Rules that only allowed to authenticated user to execute specific commands were not affected by this issue.

CVSS3: 8.8
github
больше 3 лет назад

There is an unsafe incomplete reset of PATH in OpenDoas 6.6 through 6.8 when changing the user context.

EPSS

Процентиль: 77%
0.01024
Низкий