// For flags

CVE-2020-8022

User-writeable configuration file /usr/lib/tmpfiles.d/tomcat.conf allows for escalation of priviliges

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8 allows local attackers to escalate from group tomcat to root. This issue affects: SUSE Enterprise Storage 5 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP2-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-BCL tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP3-LTSS tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server 12-SP4 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 12-SP5 tomcat versions prior to 9.0.35-3.39.1. SUSE Linux Enterprise Server 15-LTSS tomcat versions prior to 9.0.35-3.57.3. SUSE Linux Enterprise Server for SAP 12-SP2 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 12-SP3 tomcat versions prior to 8.0.53-29.32.1. SUSE Linux Enterprise Server for SAP 15 tomcat versions prior to 9.0.35-3.57.3. SUSE OpenStack Cloud 7 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud 8 tomcat versions prior to 8.0.53-29.32.1. SUSE OpenStack Cloud Crowbar 8 tomcat versions prior to 8.0.53-29.32.1.

Una vulnerabilidad de Permisos Predeterminados Incorrectos en el paquete tomcat en SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8, permite a atacantes locales escalar del grupo tomcat a root. Este problema afecta a: tomcat de SUSE Enterprise Storage 5 versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server 12-SP2-BCL versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server 12-SP2-LTSS versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server 12-SP3-BCL versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server 12-SP3-LTSS versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server 12-SP4 versiones anteriores a 9.0.35-3.39.1. tomcat de SUSE Linux Enterprise Server 12-SP5 versiones anteriores a 9.0.35-3.39.1. tomcat de SUSE Linux Enterprise Server 15-LTSS versiones anteriores a 9.0.35-3.57.3. tomcat de SUSE Linux Enterprise Server for SAP 12-SP2 versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server for SAP 12-SP3 versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE Linux Enterprise Server for SAP 15 versiones anteriores a 9.0.35-3.57.3. tomcat de SUSE OpenStack Cloud 7 versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE OpenStack Cloud 8 versiones anteriores a 8.0.53-29.32.1. tomcat de SUSE OpenStack Cloud Crowbar 8 versiones anteriores a 8.0.53-29.32.1

*Credits: Matthias Gerstner of SUSE
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-27 CVE Reserved
  • 2020-06-29 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Enterprise Storage
Search vendor "Suse" for product "Enterprise Storage"
5.0
Search vendor "Suse" for product "Enterprise Storage" and version "5.0"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp2
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp2, ltss
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp3
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp3, ltss
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp2, sap
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp3, sap
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Openstack Cloud
Search vendor "Suse" for product "Openstack Cloud"
7.0
Search vendor "Suse" for product "Openstack Cloud" and version "7.0"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Openstack Cloud
Search vendor "Suse" for product "Openstack Cloud"
8.0
Search vendor "Suse" for product "Openstack Cloud" and version "8.0"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 8.0.53-29.32.1
Search vendor "Apache" for product "Tomcat" and version " < 8.0.53-29.32.1"
-
Affected
in Suse
Search vendor "Suse"
Openstack Cloud Crowbar
Search vendor "Suse" for product "Openstack Cloud Crowbar"
8.0
Search vendor "Suse" for product "Openstack Cloud Crowbar" and version "8.0"
-
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 9.0.35-3.39.1
Search vendor "Apache" for product "Tomcat" and version " < 9.0.35-3.39.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp4
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 9.0.35-3.39.1
Search vendor "Apache" for product "Tomcat" and version " < 9.0.35-3.39.1"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
12
Search vendor "Suse" for product "Linux Enterprise Server" and version "12"
sp5
Safe
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
< 9.0.35-3.57.3
Search vendor "Apache" for product "Tomcat" and version " < 9.0.35-3.57.3"
-
Affected
in Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
15
Search vendor "Suse" for product "Linux Enterprise Server" and version "15"
sap
Safe
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.1
Search vendor "Opensuse" for product "Leap" and version "15.1"
-
Affected