"loolforkit" is a privileged program that is supposed to be run by a special, non-privileged "lool" user. Before doing anything else "loolforkit" checks, if it was invoked by the "lool" user, and refuses to run with privileges, if it's not the case. In the vulnerable version of "loolforkit" this check was wrong, so a normal user could start "loolforkit" and eventually get local root privileges.
References
Link | Resource |
---|---|
https://github.com/CollaboraOnline/online/security/advisories/GHSA-49w3-gr3w-m68v | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/01/18/3 | Mailing List Third Party Advisory |
https://github.com/CollaboraOnline/online/security/advisories/GHSA-49w3-gr3w-m68v | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/01/18/3 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/CollaboraOnline/online/security/advisories/GHSA-49w3-gr3w-m68v - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2021/01/18/3 - Mailing List, Third Party Advisory |
Information
Published : 2021-02-23 16:15
Updated : 2024-11-21 05:55
NVD link : CVE-2021-25630
Mitre link : CVE-2021-25630
CVE.ORG link : CVE-2021-25630
JSON object : View
Products Affected
collaboraoffice
- online
CWE
CWE-269
Improper Privilege Management