cvelist/2021/29xxx/CVE-2021-29005.json

67 lines
2.0 KiB
JSON
Raw Normal View History

2021-03-22 21:00:45 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-10-11 13:00:58 +00:00
"ID": "CVE-2021-29005",
"STATE": "PUBLIC"
2021-03-22 21:00:45 +00:00
},
2021-10-11 13:00:58 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-03-22 21:00:45 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-10-11 13:00:58 +00:00
"value": "Insecure permission of chmod command on rConfig server 3.9.6 exists. After installing rConfig apache user may execute chmod as root without password which may let an attacker with low privilege to gain root access on server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://rconfig.com",
"refsource": "MISC",
"name": "http://rconfig.com"
},
{
"refsource": "MISC",
"name": "https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh",
"url": "https://github.com/mrojz/rconfig-exploit/blob/main/CVE-2021-29005-POC.sh"
2021-03-22 21:00:45 +00:00
}
]
}
}