ID CVE-2024-48911
Summary OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.
References
Vulnerable Configurations
  • cpe:2.3:a:thinkst:opencanary:*:*:*:*:*:*:*:*
    cpe:2.3:a:thinkst:opencanary:*:*:*:*:*:*:*:*
CVSS
Base: None
Impact:
Exploitability:
CWE CWE-863
CAPEC
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
Last major update 17-10-2024 - 21:13
Published 14-10-2024 - 21:15
Last modified 17-10-2024 - 21:13
Back to Top