Accellion Secure File Transfer Appliance before 8_0_105 does not properly restrict access to sensitive commands and arguments that run with extra sudo privileges, which allows local administrators to gain privileges via (1) arbitrary arguments in the --file_move action in /usr/local/bin/admin.pl, or a hard link attack in (2) chmod or (3) a certain cp command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.portcullis-security.com/338.php - Exploit | |
References | () http://www.securityfocus.com/bid/38176 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/56248 - |
Information
Published : 2010-02-19 17:30
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4648
Mitre link : CVE-2009-4648
CVE.ORG link : CVE-2009-4648
JSON object : View
Products Affected
accellion
- secure_file_transfer_appliance
CWE
CWE-264
Permissions, Privileges, and Access Controls