An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
References
Link | Resource |
---|---|
https://medium.com/@ph0rensic | Third Party Advisory |
https://medium.com/@ph0rensic/three-cves-on-opmon-3ca775a262f5 | Third Party Advisory |
Configurations
Information
Published : 2020-02-06 09:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-7954
Mitre link : CVE-2020-7954
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
opservices
- opmon