René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

117 lines
3.9 KiB
JSON

{
"id": "CVE-2021-44466",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2021-12-30T22:15:09.957",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bitmask Riseup VPN 0.21.6 contains a local privilege escalation flaw due to improper access controls. When the software is installed with a non-default installation directory off of the system root, the installer fails to properly set ACLs. This allows lower privileged users to replace the VPN executable with a malicious one. When a higher privileged user such as an Administrator launches that executable, it is possible for the lower privileged user to escalate to Administrator privileges."
},
{
"lang": "es",
"value": "Bitmask Riseup VPN versi\u00f3n 0.21.6, contiene un fallo de escalada de privilegios local debido a controles de acceso inapropiados. Cuando el software es instalado con un directorio de instalaci\u00f3n no predeterminado fuera del root del sistema, el instalador no establece correctamente las ACL. Esto permite a usuarios con menos privilegios sustituir el ejecutable de la VPN por uno malicioso. Cuando un usuario con m\u00e1s privilegios, como un administrador, lanza ese ejecutable, es posible que el usuario con menos privilegios escale a privilegios de administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leap:bitmask_riseup_vpn:0.21.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D27DADB0-991C-496A-941A-22925461EB2C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/research/tra-2021-58",
"source": "vulnreport@tenable.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}