René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

109 lines
3.9 KiB
JSON

{
"id": "CVE-2022-29549",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-18T13:15:07.893",
"lastModified": "2022-09-15T16:49:18.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qualys Cloud Agent 4.8.0-49. It executes programs at various full pathnames without first making ownership and permission checks (e.g., to help ensure that a program was installed by root) and without integrity checks (e.g., a checksum comparison against known legitimate programs). Also, the vendor recommendation is to install this agent software with root privileges. Thus, privilege escalation is possible on systems where any of these pathnames is controlled by a non-root user. An example is /opt/firebird/bin/isql, where the /opt/firebird directory is often owned by the firebird user."
},
{
"lang": "es",
"value": "Se ha detectado un problema en Qualys Cloud Agent versi\u00f3n 4.8.0-49. Ejecuta programas en varios nombres de ruta completos sin realizar primero comprobaciones de propiedad y permisos (por ejemplo, para ayudar a garantizar que un programa fue instalado por el usuario root) y sin realizar comprobaciones de integridad (por ejemplo, una comparaci\u00f3n de la suma de comprobaci\u00f3n con programas leg\u00edtimos conocidos). Adem\u00e1s, la recomendaci\u00f3n del proveedor es instalar este software de agente con privilegios root. Por lo tanto, la escalada de privilegios es posible en sistemas donde cualquiera de estos nombres de ruta es controlado por un usuario no root. Un ejemplo es /opt/firebird/bin/isql, donde el directorio /opt/firebird suele ser propiedad del usuario firebird."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qualys:cloud_agent_for_linux:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.548.2",
"matchCriteriaId": "42D6EC8A-4FA4-415E-BB32-66C4745EC146"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168367/Qualys-Cloud-Agent-Arbitrary-Code-Execution.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Sep/10",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://software.firstworks.com/p/getting-started-with-firebird.html",
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://blog.qualys.com/product-tech/2022/08/15/qualys-security-updates-cloud-agent-for-linux",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://blog.qualys.com/vulnerabilities-threat-research",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}