raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
References
Link | Resource |
---|---|
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-08-24 06:15
Updated : 2021-09-02 09:26
NVD link : CVE-2021-38557
Mitre link : CVE-2021-38557
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
raspap
- raspap