Lucene search

K
cveRedhatCVE-2020-36771
HistoryJan 22, 2024 - 2:15 p.m.

CVE-2020-36771

2024-01-2214:15:07
CWE-214
redhat
web.nvd.nist.gov
31
cve-2020-36771
cloudlinux
cagefs
authentication token
command line argument
local users
process list
code execution

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0

Percentile

14.2%

CloudLinux CageFS 7.1.1-1 or below passes the authentication token as a command line argument. In some configurations this allows local users to view the authentication token via the process list and gain code execution as another user.

Affected configurations

Nvd
Vulners
Node
cloudlinuxcagefsRange<7.1.2-2
VendorProductVersionCPE
cloudlinuxcagefs*cpe:2.3:a:cloudlinux:cagefs:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "cagefs",
    "vendor": "Cloudlinux OS",
    "versions": [
      {
        "status": "affected",
        "version": "7.1.1-1"
      },
      {
        "status": "unaffected",
        "version": "7.1.2-2"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0

Percentile

14.2%

Related for CVE-2020-36771