CVE-2009-4648

Accellion Secure File Transfer Appliance before 8_0_105 does not properly restrict access to sensitive commands and arguments that run with extra sudo privileges, which allows local administrators to gain privileges via (1) arbitrary arguments in the --file_move action in /usr/local/bin/admin.pl, or a hard link attack in (2) chmod or (3) a certain cp command.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_135:*:*:*:*:*:*:*
cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_178:*:*:*:*:*:*:*
cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_189:*:*:*:*:*:*:*
cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_259:*:*:*:*:*:*:*
cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_296:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-02-19 17:30

Updated : 2024-02-28 11:41


NVD link : CVE-2009-4648

Mitre link : CVE-2009-4648

CVE.ORG link : CVE-2009-4648


JSON object : View

Products Affected

accellion

  • secure_file_transfer_appliance
CWE
CWE-264

Permissions, Privileges, and Access Controls