Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvc3-w2g2-g64j

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.

An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.

EPSS

Процентиль: 35%
0.00148
Низкий

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
nvd
около 6 лет назад

An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.

EPSS

Процентиль: 35%
0.00148
Низкий

Дефекты

CWE-269