Описание
An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:opservices:opmon:9.3.2:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00148
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-306
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
EPSS
Процентиль: 35%
0.00148
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-306