Sensu, Inc. Sensu Core version Before version 1.4.2-3 contains a Insecure Permissions vulnerability in Sensu Core on Windows platforms that can result in Unprivileged users may execute code in context of Sensu service account. This attack appear to be exploitable via Unprivileged user may place an arbitrary DLL in the c:\opt\sensu\embedded\bin directory in order to exploit standard Windows DLL load order behavior. This vulnerability appears to have been fixed in 1.4.2-3 and later.
References
Link | Resource |
---|---|
https://docs.sensu.io/sensu-core/1.4/changelog/#core-v1-4-2 | Vendor Advisory |
https://docs.sensu.io/sensu-core/1.4/changelog/#core-v1-4-2 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.sensu.io/sensu-core/1.4/changelog/#core-v1-4-2 - Vendor Advisory |
Information
Published : 2018-07-13 18:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000209
Mitre link : CVE-2018-1000209
CVE.ORG link : CVE-2018-1000209
JSON object : View
Products Affected
sensu
- sensu_core
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource