Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rxm5-9q2g-4c8r

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

EPSS

Процентиль: 13%
0.00044
Низкий

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.

EPSS

Процентиль: 13%
0.00044
Низкий

Дефекты

CWE-269