{ "id": "CVE-2020-26131", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-28T18:15:13.553", "lastModified": "2024-11-21T05:19:18.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Issues were discovered in Open DHCP Server (Regular) 1.75 and Open DHCP Server (LDAP Based) 0.1Beta. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenDHCPServer.exe (Regular) or the OpenDHCPLdap.exe (LDAP Based) binary." }, { "lang": "es", "value": "Se detectaron problemas en Open DHCP Server (Regular) versi\u00f3n 1.75 y Open DHCP Server (LDAP Based) versi\u00f3n 0.1Beta. Debido a restricciones insuficientes de acceso en el directorio de instalaci\u00f3n predeterminado, un atacante puede escalar privilegios al reemplazar el binario OpenDHCPServer.exe (Regular) o OpenDHCPLdap.exe (Basado en LDAP)" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-732" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:open_dhcp_server_project:open_dhcp_server:0.1:beta:*:*:ldap:*:*:*", "matchCriteriaId": "7276F564-659C-414C-9181-C5130B1D7FCF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open_dhcp_server_project:open_dhcp_server:1.75:*:*:*:regular:*:*:*", "matchCriteriaId": "A29AD9B6-7B2B-4683-9AC4-6D837AC7FE76" } ] } ] } ], "references": [ { "url": "https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md", "source": "cve@mitre.org" }, { "url": "https://github.com/an0ry/advisories", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://sourceforge.net/projects/dhcpserver/", "source": "cve@mitre.org", "tags": [ "Product" ] }, { "url": "https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://github.com/an0ry/advisories", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://sourceforge.net/projects/dhcpserver/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ] } ] }