5 results (0.005 seconds)

CVSS: 5.2EPSS: 0%CPEs: 1EXPL: 2

osquery is a SQL powered operating system instrumentation, monitoring, and analytics framework. In osquery before version 4.6.0, by using sqlite's ATTACH verb, someone with administrative access to osquery can cause reads and writes to arbitrary sqlite databases on disk. This _does_ allow arbitrary files to be created, but they will be sqlite databases. It does not appear to allow existing non-sqlite files to be overwritten. This has been patched in osquery 4.6.0. • https://github.com/osquery/osquery/commit/c3f9a3dae22d43ed3b4f6a403cbf89da4cba7c3c https://github.com/osquery/osquery/releases/tag/4.6.0 https://github.com/osquery/osquery/security/advisories/GHSA-4g56-2482-x7q8 https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/SQLite%20Injection.md#remote-command-execution-using-sqlite-command---load_extension • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 1

osquery before version 4.4.0 enables a privilege escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables local escalation. This is fixed in version 4.4.0. osquery versiones anteriores a 4.4.0, habilita una vulnerabilidad de escalada de privilegios. Si un sistema Windows está configurado con una PATH que contiene un directorio escribible por parte del usuario, entonces un usuario local puede escribir una biblioteca DLL zlib1.dll, que osquery intentará cargar. • https://github.com/osquery/osquery/commit/4d4957f12a6aa0becc9d01d9f97061e1e3d809c5 https://github.com/osquery/osquery/issues/6426 https://github.com/osquery/osquery/pull/6433 https://github.com/osquery/osquery/releases/tag/4.4.0 https://github.com/osquery/osquery/security/advisories/GHSA-2xwp-8fv7-c5pm • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Incorrect validation of the TLS SNI hostname in osquery versions after 2.9.0 and before 4.2.0 could allow an attacker to MITM osquery traffic in the absence of a configured root chain of trust. Una comprobación incorrecta del nombre de host TLS SNI en osquery versiones posteriores a 2.9.0 y anteriores a 4.2.0, podría permitir a un atacante un MITM en el tráfico de osquery en ausencia de una cadena root configurada de confianza. • https://github.com/osquery/osquery/pull/6197 https://www.facebook.com/security/advisories/cve-2020-1887 • CWE-295: Improper Certificate Validation CWE-297: Improper Validation of Certificate with Host Mismatch •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

In some configurations an attacker can inject a new executable path into the extensions.load file for osquery and hard link a parent folder of a malicious binary to a folder with known 'safe' permissions. Under those circumstances osquery will load said malicious executable with SYSTEM permissions. The solution is to migrate installations to the 'Program Files' directory on Windows which restricts unprivileged write access. This issue affects osquery prior to v3.4.0. En algunas configuraciones, un atacante puede inyectar una nueva ruta ejecutable en el archivo extensions.load para osquery y vincular una carpeta principal de un binario malicioso a una carpeta con permisos "seguros" conocidos. • https://www.facebook.com/security/advisories/cve-2019-3567 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7 Se ha descubierto un problema en osquery. Un binario universal/fat manipulado puede evadir las comprobaciones de firma de código de terceros. • https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks • CWE-254: 7PK - Security Features CWE-354: Improper Validation of Integrity Check Value •