Description
In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary code execution with root privileges.
Affected Software
Related
{"id": "CVE-2021-39274", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-39274", "description": "In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary code execution with root privileges.", "published": "2021-08-19T12:15:00", "modified": "2021-08-30T11:29:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0}, "severity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-39274", "reporter": "cve@mitre.org", "references": ["https://github.com/1N3/Sn1per/releases", "https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274", "https://github.com/1N3/Sn1per/issues/357"], "cvelist": ["CVE-2021-39274"], "immutableFields": [], "lastseen": "2022-03-23T19:02:54", "viewCount": 17, "enchantments": {"dependencies": {"references": [{"type": "githubexploit", "idList": ["8BDEF189-25AA-5BBC-B931-BF029CBA4051"]}]}, "score": {"value": 6.9, "vector": "NONE"}, "twitter": {"counter": 2, "modified": "2021-08-20T07:54:38", "tweets": [{"link": "https://twitter.com/threatmeter/status/1428615281736396800", "text": "CVE-2021-39274 In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary co\u2026 https://t.co/yuVmkKLpY4?amp=1"}, {"link": "https://twitter.com/threatmeter/status/1428615281736396800", "text": "CVE-2021-39274 In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary co\u2026 https://t.co/yuVmkKLpY4?amp=1"}]}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-39273"]}, {"type": "githubexploit", "idList": ["8BDEF189-25AA-5BBC-B931-BF029CBA4051"]}]}, "exploitation": null, "vulnersScore": 6.9}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:xerosecurity:sn1per:9.0"], "cpe23": ["cpe:2.3:a:xerosecurity:sn1per:9.0:*:*:*:*:*:*:*"], "cwe": ["CWE-276"], "affectedSoftware": [{"cpeName": "xerosecurity:sn1per", "version": "9.0", "operator": "eq", "name": "xerosecurity sn1per"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:xerosecurity:sn1per:9.0:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/1N3/Sn1per/releases", "name": "https://github.com/1N3/Sn1per/releases", "refsource": "MISC", "tags": ["Release Notes", "Third Party Advisory"]}, {"url": "https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274", "name": "https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}, {"url": "https://github.com/1N3/Sn1per/issues/357", "name": "https://github.com/1N3/Sn1per/issues/357", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}]}
{"githubexploit": [{"lastseen": "2021-12-10T15:32:15", "description": "# CVE-2021-39273\n## _In XeroSecurity Sn1per 9.0 (free version), ...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-08-17T15:50:48", "type": "githubexploit", "title": "Exploit for Incorrect Default Permissions in Xerosecurity Sn1Per", "bulletinFamily": "exploit", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-39273", "CVE-2021-39274"], "modified": "2021-08-22T12:05:10", "id": "8BDEF189-25AA-5BBC-B931-BF029CBA4051", "href": "", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "privateArea": 1}]}