40 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2020-36771",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-22T14:15:07.530",
"lastModified": "2024-01-26T16:15:21.483",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CloudLinux\n CageFS 7.1.1-1 or below passes the authentication token as command line\n argument. In some configurations this allows local users to view it via\n the process list and gain code execution as another user.\n\n\n"
},
{
"lang": "es",
"value": "CloudLinux CageFS 7.1.1-1 o inferior pasa el token de autenticaci\u00f3n como argumento de l\u00ednea de comando. En algunas configuraciones, esto permite a los usuarios locales verlo a trav\u00e9s de la lista de procesos y obtener la ejecuci\u00f3n del c\u00f3digo como otro usuario."
}
],
"metrics": {},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-214"
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/24",
"source": "secalert@redhat.com"
},
{
"url": "https://blog.cloudlinux.com/cagefs-lve-wrappers-and-bsock-have-been-rolled-out-to-100",
"source": "secalert@redhat.com"
}
]
}