Описание
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:v2rayl_project:v2rayl:2.1.3:*:*:*:*:*:*:*
EPSS
Процентиль: 30%
0.00113
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269
Связанные уязвимости
github
больше 3 лет назад
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
EPSS
Процентиль: 30%
0.00113
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269