When Octopus Tentacle is installed on a Linux operating system, the systemd service file permissions are misconfigured. This could lead to a local unprivileged user modifying the contents of the systemd service file to gain privileged access.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://advisories.octopus.com/adv/2021-11---Local-privilege-escalation-in-Octopus-Tentacle-%28CVE-2021-31822%29.2283732993.html - |
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-11-24 16:15
Updated : 2024-11-21 06:06
NVD link : CVE-2021-31822
Mitre link : CVE-2021-31822
CVE.ORG link : CVE-2021-31822
JSON object : View
Products Affected
linux
- linux_kernel
octopus
- tentacle
CWE
CWE-276
Incorrect Default Permissions