raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1979 raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
Github GHSA Github GHSA GHSA-536p-4pcj-5mr9 raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:44:23.480Z

Reserved: 2021-08-11T00:00:00

Link: CVE-2021-38557

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-24T13:15:14.513

Modified: 2024-11-21T06:17:26.340

Link: CVE-2021-38557

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.