mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
137 lines
5.0 KiB
JSON
137 lines
5.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@suse.com",
|
|
"DATE_PUBLIC": "2020-07-24T00:00:00.000Z",
|
|
"ID": "CVE-2020-8026",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "inn: non-root owned files"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "openSUSE Leap 15.2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "inn",
|
|
"version_value": "2.6.2-lp152.1.26"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "openSUSE Tumbleweed",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "inn",
|
|
"version_value": "2.6.2-4.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "openSUSE Leap 15.1",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "inn",
|
|
"version_value": "2.5.4-lp151.3.3.1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "openSUSE"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Matthias Gerstner/Johannes Segitz of SUSE"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions."
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "LOCAL",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.4,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-276: Incorrect Default Permissions"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1172573",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1172573"
|
|
},
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:1271",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html"
|
|
},
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:1272",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html"
|
|
},
|
|
{
|
|
"refsource": "SUSE",
|
|
"name": "openSUSE-SU-2020:1304",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1172573",
|
|
"defect": [
|
|
"1172573"
|
|
],
|
|
"discovery": "INTERNAL"
|
|
}
|
|
} |