Issues were discovered in Open DHCP Server (Regular) 1.75 and Open DHCP Server (LDAP Based) 0.1Beta. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenDHCPServer.exe (Regular) or the OpenDHCPLdap.exe (LDAP Based) binary.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md | |
| https://github.com/an0ry/advisories | Exploit Third Party Advisory | 
| https://sourceforge.net/projects/dhcpserver/ | Product | 
| https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md | |
| https://github.com/an0ry/advisories | Exploit Third Party Advisory | 
| https://sourceforge.net/projects/dhcpserver/ | Product | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2020-10-28 18:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26131
Mitre link : CVE-2020-26131
CVE.ORG link : CVE-2020-26131
JSON object : View
Products Affected
                open_dhcp_server_project
- open_dhcp_server
CWE
                
                    
                        
                        CWE-732
                        
            Incorrect Permission Assignment for Critical Resource
