Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4482

Опубликовано: 20 нояб. 2013
Источник: redhat
CVSS2: 3.7
EPSS Низкий

Описание

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

A flaw was found in the way the luci service was initialized. If a system administrator started the luci service from a directory that was writable to by a local user, that user could use this flaw to execute arbitrary code as the root or luci user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5congaNot affected
Red Hat Enterprise Linux 6luciFixedRHSA-2013:160320.11.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=990321luci: paster hidden untrusted path and "command" (callable association) injection

EPSS

Процентиль: 21%
0.00068
Низкий

3.7 Low

CVSS2

Связанные уязвимости

nvd
около 12 лет назад

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

github
больше 3 лет назад

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

EPSS

Процентиль: 21%
0.00068
Низкий

3.7 Low

CVSS2