Описание
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
Ссылки
- ExploitThird Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.1 (исключая)
cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*
EPSS
Процентиль: 30%
0.00115
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in Pi-Hole through 5.0. The local www-data user has sudo privileges to execute the pihole core script as root without a password, which could allow an attacker to obtain root access via shell metacharacters to this script's setdns command.
EPSS
Процентиль: 30%
0.00115
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-78