Логотип exploitDog
bind:CVE-2024-48911
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-48911

Количество 2

Количество 2

nvd логотип

CVE-2024-48911

больше 1 года назад

OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-pf5v-pqfv-x8jj

больше 1 года назад

OpenCanary Executes Commands From Potentially Writable Config File

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-48911

OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-pf5v-pqfv-x8jj

OpenCanary Executes Commands From Potentially Writable Config File

CVSS3: 7.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу