René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

126 lines
5.1 KiB
JSON

{
"id": "CVE-2020-24046",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-17T17:15:16.100",
"lastModified": "2020-09-24T13:46:51.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A sandbox escape issue was discovered in TitanHQ SpamTitan Gateway 7.07. It limits the admin user to a restricted shell, allowing execution of a small number of tools of the operating system. This restricted shell can be bypassed after changing the properties of the user admin in the operating system file /etc/passwd. This file cannot be accessed though the restricted shell, but it can be modified by abusing the Backup/Import Backup functionality of the web interface. An authenticated attacker would be able to obtain the file /var/tmp/admin.passwd after executing a Backup operation. This file can be manually modified to change the GUID of the user to 0 (root) and change the restricted shell to a normal shell /bin/sh. After the modification is done, the file can be recompressed to a .tar.bz file and imported again via the Import Backup functionality. The properties of the admin user will be overwritten and a root shell will be granted to the user upon the next successful login."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de escape del sandbox en TitanHQ SpamTitan Gateway versi\u00f3n 7.07. Limita al usuario administrador a un shell restringido, permitiendo una ejecuci\u00f3n de un peque\u00f1o n\u00famero de herramientas del sistema operativo. Este shell restringido puede ser omitido despu\u00e9s de cambiar las propiedades del administrador del usuario en el archivo del sistema operativo /etc/passwd. Este archivo no puede ser accedido por medio del shell restringido, pero puede ser modificado al abusar de la funcionalidad Backup/Import Backup de la interfaz web. Un atacante autenticado podr\u00eda ser capaz de obtener el archivo /var/tmp/admin.passwd despu\u00e9s de ejecutar una operaci\u00f3n Backup. Este archivo puede ser manualmente modificado para cambiar el GUID del usuario a 0 (root) y cambiar el shell restringido a un shell /bin/sh normal. Despu\u00e9s de realizada la modificaci\u00f3n, el archivo puede ser comprimir nuevamente a .tar. bz e importado de nuevo mediante la funcionalidad Import Backup. Las propiedades del usuario administrador se sobrescribir\u00e1n y se le otorgar\u00e1 un shell ra\u00edz al usuario en el pr\u00f3ximo inicio de sesi\u00f3n exitoso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:titanhq:spamtitan:7.07:*:*:*:*:*:*:*",
"matchCriteriaId": "237E0708-6807-472F-A18C-E72871D7C74D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/felmoltor",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sensepost.com/blog/2020/clash-of-the-spamtitan/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/felmoltor",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.titanhq.com",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}