Description
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-3040 | v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:06:09.954Z
Reserved: 2020-03-14T00:00:00.000Z
Link: CVE-2020-10589
No data.
Status : Modified
Published: 2020-03-15T21:15:11.787
Modified: 2024-11-21T04:55:39.070
Link: CVE-2020-10589
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD