Privilege escalation in Replibit Backup Manager earlier than version 2017.08.04 allows attackers to gain root privileges via sudo command execution. The vi program can be accessed through sudo, in order to navigate the filesystem and modify a critical file such as /etc/passwd.
References
Link | Resource |
---|---|
https://github.com/Wh1t3Rh1n0/exploits/blob/master/2017-08-25%20Replibit%20Backup%20Manager/README.md | Exploit Issue Tracking Third Party Advisory |
https://github.com/Wh1t3Rh1n0/exploits/blob/master/2017-08-25%20Replibit%20Backup%20Manager/README.md | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Wh1t3Rh1n0/exploits/blob/master/2017-08-25%20Replibit%20Backup%20Manager/README.md - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2017-08-27 15:29
Updated : 2024-11-21 03:11
NVD link : CVE-2017-13707
Mitre link : CVE-2017-13707
CVE.ORG link : CVE-2017-13707
JSON object : View
Products Affected
axcient
- replibit
CWE
CWE-269
Improper Privilege Management