Lucene search

K
cvelistRapid7CVELIST:CVE-2020-7376
HistoryAug 17, 2020 - 12:00 a.m.

CVE-2020-7376 Rapid7 Metasploit Framework Relative Path Traversal in enum_osx module

2020-08-1700:00:00
CWE-23
rapid7
www.cve.org

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

9.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.7%

The Metasploit Framework module “post/osx/gather/enum_osx module” is affected by a relative path traversal vulnerability in the get_keychains method which can be exploited to write arbitrary files to arbitrary locations on the host filesystem when the module is run on a malicious host.

CNA Affected

[
  {
    "product": "Metasploit Framework",
    "vendor": "Rapid7",
    "versions": [
      {
        "lessThan": "4.11.7*",
        "status": "affected",
        "version": "4.11.7",
        "versionType": "custom"
      },
      {
        "lessThan": "6.0.3",
        "status": "affected",
        "version": "6.0.3",
        "versionType": "custom"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

9.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.7%

Related for CVELIST:CVE-2020-7376