CVE-2020-26131

Issues were discovered in Open DHCP Server (Regular) 1.75 and Open DHCP Server (LDAP Based) 0.1Beta. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenDHCPServer.exe (Regular) or the OpenDHCPLdap.exe (LDAP Based) binary.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:open_dhcp_server_project:open_dhcp_server:0.1:beta:*:*:ldap:*:*:*
cpe:2.3:a:open_dhcp_server_project:open_dhcp_server:1.75:*:*:*:regular:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md - () https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md -
References () https://github.com/an0ry/advisories - Exploit, Third Party Advisory () https://github.com/an0ry/advisories - Exploit, Third Party Advisory
References () https://sourceforge.net/projects/dhcpserver/ - Product () https://sourceforge.net/projects/dhcpserver/ - Product

Information

Published : 2020-10-28 18:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26131

Mitre link : CVE-2020-26131

CVE.ORG link : CVE-2020-26131


JSON object : View

Products Affected

open_dhcp_server_project

  • open_dhcp_server
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource