GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
References
Link | Resource |
---|---|
https://github.com/GNS3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db | Patch Third Party Advisory |
https://theevilbit.github.io/posts/ | Exploit Third Party Advisory |
https://github.com/GNS3/gns3-server/releases/tag/v2.1.17 | Release Notes Third Party Advisory |
https://www.gns3.com/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-06-23 13:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-14976
Mitre link : CVE-2020-14976
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
gns3
- ubridge
- gns3