In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-5918 | In QuickBox Community Edition through 2.5.5 and Pro Edition through 2.1.8, the local www-data user has sudo privileges to execute grep as root without a password, which allows an attacker to obtain sensitive information via a grep of a /root/*.db or /etc/shadow file. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://s1gh.sh/cve-2020-13448-quickbox-authenticated-rce/ |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:25:16.481Z
Reserved: 2020-05-29T00:00:00
Link: CVE-2020-13695
No data.
Status : Modified
Published: 2020-06-01T18:15:11.003
Modified: 2024-11-21T05:01:45.423
Link: CVE-2020-13695
No data.
OpenCVE Enrichment
No data.
EUVD