Pritunl Client v1.2.2550.20 contains a local privilege escalation vulnerability in the pritunl-service component. The attack vector is: malicious openvpn config. A local attacker could leverage the log and log-append along with log injection to create or append to privileged script files and execute code as root/SYSTEM.
References
Configurations
History
No history.
Information
Published : 2021-04-30 14:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27519
Mitre link : CVE-2020-27519
CVE.ORG link : CVE-2020-27519
JSON object : View
Products Affected
pritunl
- pritunl-client-electron
CWE
CWE-269
Improper Privilege Management