Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistence or to bypass security controls. NOTE: the vendor states that this "requires a high degree of access and other preconditions that are tough to achieve."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-04-02T22:13:47
Updated: 2024-08-04T11:35:12.431Z
Reserved: 2020-04-02T00:00:00
Link: CVE-2020-11498
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-04-02T23:15:13.033
Modified: 2024-11-21T04:58:01.207
Link: CVE-2020-11498
Redhat
No data.