7.8
CVE-2020-25989
- EPSS 0.25%
- Veröffentlicht 19.11.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:19:02
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Privilege escalation via arbitrary file write in pritunl electron client 1.0.1116.6 through v1.2.2550.20. Successful exploitation of the issue may allow an attacker to execute code on the effected system with root privileges.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Pritunl ≫ Pritunl-client-electron Version >= 1.0.1116.6 <= 1.2.2550.20
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.483 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.