3 results (0.060 seconds)

CVSS: 4.2EPSS: 0%CPEs: 3EXPL: 0

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks. CISOfy Lynis versiones anteriores a 3.0.0, presenta un Control de Acceso Incorrecto debido a una condición de carrera TOCTOU. • https://cisofy.com/security/cve/cve-2020-13882 https://cwe.mitre.org/data/definitions/367.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 3.3EPSS: 0%CPEs: 5EXPL: 0

In CISOfy Lynis 2.x through 2.7.5, the license key can be obtained by looking at the process list when a data upload is being performed. This license can be used to upload data to a central Lynis server. Although no data can be extracted by knowing the license key, it may be possible to upload the data of additional scans. En CISOfy Lynis versiones 2.x hasta 2.7.5, la clave de licencia puede ser obtenida mediante la búsqueda de la lista de procesos cuando se lleva cabo una carga de datos. Esta licencia puede ser usada para cargar datos en un servidor central de Lynis. • https://cisofy.com/security/cve/cve-2019-13033 https://lists.debian.org/debian-lts-announce/2020/06/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDCHEKNR3HPJRNHE5PYKFH5GNBADTPA7 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBFHIX6RTHCK37FXMAAXP4KGAMLUFDUD • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Unspecified tests in Lynis before 2.5.0 allow local users to write to arbitrary files or possibly gain privileges via a symlink attack on a temporary file. Pruebas sin especificar en Lynis en versiones anteriores a la 2.5.0 permiten que usuarios locales escriban en archivos arbitrarios o que obtengan privilegios mediante un ataque de vínculo simbólico en un archivo temporal. • http://www.securityfocus.com/bid/99288 https://cisofy.com/security/cve/cve-2017-8108 https://github.com/CISOfy/lynis/releases/tag/2.5.0 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJXMPYANXHI25NQZ36QMXNXANDRAA5YG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJHLLWNW7NASVXCK24YBSIUQQPWGCMB5 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •