Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pxp-6h5g-5389

Опубликовано: 18 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

EPSS

Процентиль: 10%
0.00035
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-277
CWE-732

Связанные уязвимости

CVSS3: 6.7
nvd
около 1 года назад

IBM Robotic Process Automation 21.0.0 through 21.0.7.17 and 23.0.0 through 23.0.18 could allow a local user to escalate their privileges. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service. A subsequent service or server restart will then run that binary with administrator privilege.

CVSS3: 6.7
fstec
больше 1 года назад

Уязвимость установщика программного средства автоматизации бизнес-процессов IBM Robotic Process Automation, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 10%
0.00035
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-277
CWE-732