raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
References
Link | Resource |
---|---|
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory URL Repurposed |
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory URL Repurposed |
Configurations
History
21 Nov 2024, 06:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RaspAP/raspap-webgui - Product | |
References | () https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers - Third Party Advisory | |
References | () https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2021-08-24 13:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38557
Mitre link : CVE-2021-38557
CVE.ORG link : CVE-2021-38557
JSON object : View
Products Affected
raspap
- raspap
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource