log-user-session version 0.7 and earlier contains a Directory Traversal vulnerability in Main SUID-binary /usr/local/bin/log-user-session that can result in User to root privilege escalation. This attack appear to be exploitable via Malicious unprivileged user executes the vulnerable binary/(remote) environment variable manipulation similar shell-shock also possible.
References
Link | Resource |
---|---|
https://www.halfdog.net/Security/2018/LogUserSessionLocalRootPrivilegeEscalation/ | Exploit Third Party Advisory |
https://www.halfdog.net/Security/2018/LogUserSessionLocalRootPrivilegeEscalation/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-12-20 17:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000857
Mitre link : CVE-2018-1000857
CVE.ORG link : CVE-2018-1000857
JSON object : View
Products Affected
open-systems
- log-user-session
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')