Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rf3p-79w2-25vp

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.

lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.

EPSS

Процентиль: 55%
0.00325
Низкий

Связанные уязвимости

nvd
больше 21 года назад

lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.

EPSS

Процентиль: 55%
0.00325
Низкий