An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
References
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40ph0rensic - | |
References | () https://medium.com/%40ph0rensic/three-cves-on-opmon-3ca775a262f5 - |
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-02-06 17:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-7954
Mitre link : CVE-2020-7954
CVE.ORG link : CVE-2020-7954
JSON object : View
Products Affected
opservices
- opmon
CWE
CWE-306
Missing Authentication for Critical Function