CVE-2013-3500

The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gwos:groundwork_monitor:6.7.0:-:enterprise:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://www.kb.cert.org/vuls/id/345260 - US Government Resource () http://www.kb.cert.org/vuls/id/345260 - US Government Resource
References () https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls - () https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls -
References () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt - () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt -

Information

Published : 2013-05-08 12:09

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3500

Mitre link : CVE-2013-3500

CVE.ORG link : CVE-2013-3500


JSON object : View

Products Affected

gwos

  • groundwork_monitor
CWE
CWE-264

Permissions, Privileges, and Access Controls