Описание
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistence or to bypass security controls. NOTE: the vendor states that this "requires a high degree of access and other preconditions that are tough to achieve."
Ссылки
- ExploitThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.1.0 (включая)
cpe:2.3:a:slack:nebula:*:*:*:*:*:*:*:*
EPSS
Процентиль: 54%
0.00313
Низкий
8.8 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-22
EPSS
Процентиль: 54%
0.00313
Низкий
8.8 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-22