Vulnerability CVE-2020-15397


Published: 2020-06-30

Description:
HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

Type:

CWE-269

(Improper Privilege Management)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
IFAX -> Hylafax enterprise 
Hylafax\+ project -> Hylafax\+ 

 References:
https://bugzilla.suse.com/show_bug.cgi?id=1173519
https://sourceforge.net/p/hylafax/HylaFAX+/2534/

Copyright 2020, cxsecurity.com

 

Back to Top