Vulnerability CVE-2020-11081


Published: 2020-07-10

Description:
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0.

Type:

CWE-426

(Untrusted Search Path)

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.4/10
6.4/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Linuxfoundation -> Osquery 

 References:
https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5
https://github.com/osquery/osquery/issues/6426
https://github.com/osquery/osquery/pull/6433
https://github.com/osquery/osquery/releases/tag/4.4.0
https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm

Copyright 2024, cxsecurity.com

 

Back to Top