The Foundation webapp admin interface in GroundWork Monitor Enterprise 6.7.0 uses the nagios account as the owner of writable files under /usr/local/groundwork, which allows context-dependent attackers to bypass intended filesystem restrictions by leveraging access to a GroundWork script.
References
Configurations
History
21 Nov 2024, 01:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/345260 - US Government Resource | |
References | () https://kb.groundworkopensource.com/display/SUPPORT/SA6.7.0-1+Some+web+components+allow+bypass+of+role+access+controls - | |
References | () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20130308-0_GroundWork_Monitoring_Multiple_critical_vulnerabilities_wo_poc_v10.txt - |
Information
Published : 2013-05-08 12:09
Updated : 2024-11-21 01:53
NVD link : CVE-2013-3500
Mitre link : CVE-2013-3500
CVE.ORG link : CVE-2013-3500
JSON object : View
Products Affected
gwos
- groundwork_monitor
CWE
CWE-264
Permissions, Privileges, and Access Controls