Description
An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28876 | An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:48:24.954Z
Reserved: 2020-01-24T00:00:00.000Z
Link: CVE-2020-7954
No data.
Status : Modified
Published: 2020-02-06T17:15:14.600
Modified: 2024-11-21T05:38:04.953
Link: CVE-2020-7954
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD