CVE-2020-13695

In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:quickbox:quickbox:*:*:*:*:community:*:*:*

Configuration 2 (hide)

cpe:2.3:a:quickbox:quickbox:*:*:*:*:pro:*:*:*

History

21 Nov 2024, 05:01

Type Values Removed Values Added
References () https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/ - Exploit, Third Party Advisory () https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/ - Exploit, Third Party Advisory

Information

Published : 2020-06-01 18:15

Updated : 2024-11-21 05:01


NVD link : CVE-2020-13695

Mitre link : CVE-2020-13695

CVE.ORG link : CVE-2020-13695


JSON object : View

Products Affected

quickbox

  • quickbox
CWE
CWE-269

Improper Privilege Management

CWE-306

Missing Authentication for Critical Function