Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hgwp-4vp4-qmm2

Опубликовано: 24 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 7.8

Описание

Local Privilege Escalation in cloudflared

In cloudflared versions < 2020.8.1 (corresponding to 0.0.0-20200820025921-9323844ea773 on pkg.go.dev) on Windows, if an administrator has started cloudflared and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that cloudflared reads its configuration file. One of the locations that cloudflared reads from (C:\etc) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, cloudflared would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.

Пакеты

Наименование

github.com/cloudflare/cloudflared

go
Затронутые версииВерсия исправления

< 0.0.0-20200820025921-9323844ea773

0.0.0-20200820025921-9323844ea773

EPSS

Процентиль: 9%
0.00033
Низкий

7.8 High

CVSS3

Дефекты

CWE-427

Связанные уязвимости

CVSS3: 6.4
nvd
больше 5 лет назад

`cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue.

EPSS

Процентиль: 9%
0.00033
Низкий

7.8 High

CVSS3

Дефекты

CWE-427