osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0.
References
Link | Resource |
---|---|
https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm | Third Party Advisory |
https://github.com/osquery/osquery/pull/6433 | Patch Third Party Advisory |
https://github.com/osquery/osquery/releases/tag/4.4.0 | Release Notes Third Party Advisory |
https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5 | Patch Third Party Advisory |
https://github.com/osquery/osquery/issues/6426 | Exploit Issue Tracking Third Party Advisory |
Configurations
Information
Published : 2020-07-10 12:15
Updated : 2023-01-20 12:32
NVD link : CVE-2020-11081
Mitre link : CVE-2020-11081
JSON object : View
CWE
CWE-114
Process Control
Products Affected
linuxfoundation
- osquery