CVE-2011-4338

Shaman 1.0.9: Users can add the line askforpwd=false to his shaman.conf file, without entering the root password in shaman. The next time shaman is run, root privileges are granted despite the fact that the user never entered the root password.
References
Link Resource
https://bbs.archlinux.org/viewtopic.php?id=64066&p=1 Exploit Third Party Advisory
https://www.openwall.com/lists/oss-security/2011/11/22/4 Mailing List Third Party Advisory
https://bbs.archlinux.org/viewtopic.php?id=64066&p=1 Exploit Third Party Advisory
https://www.openwall.com/lists/oss-security/2011/11/22/4 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:shaman_project:shaman:1.0.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () https://bbs.archlinux.org/viewtopic.php?id=64066&p=1 - Exploit, Third Party Advisory () https://bbs.archlinux.org/viewtopic.php?id=64066&p=1 - Exploit, Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2011/11/22/4 - Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2011/11/22/4 - Mailing List, Third Party Advisory

Information

Published : 2020-02-12 19:15

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4338

Mitre link : CVE-2011-4338

CVE.ORG link : CVE-2011-4338


JSON object : View

Products Affected

shaman_project

  • shaman
CWE
CWE-287

Improper Authentication