Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistence or to bypass security controls. NOTE: the vendor states that this "requires a high degree of access and other preconditions that are tough to achieve."
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2020-04-02T22:13:47

Updated: 2024-08-04T11:35:12.431Z

Reserved: 2020-04-02T00:00:00

Link: CVE-2020-11498

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-04-02T23:15:13.033

Modified: 2020-04-06T18:25:01.313

Link: CVE-2020-11498

cve-icon Redhat

No data.