gsd-2020-1984
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with 'create folders or append data' access to the root of the OS disk (C:\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-1984", "description": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.", "id": "GSD-2020-1984" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-1984" ], "details": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.", "id": "GSD-2020-1984", "modified": "2023-12-13T01:21:58.341293Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1984", "STATE": "PUBLIC", "TITLE": "Secdo: Privilege escalation via hardcoded script path" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Secdo", "version": { "version_data": [ { "platform": "Windows", "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Secdo" } ] } }, "credit": [ { "lang": "eng", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-73 External Control of File Name or Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1984", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1984" } ] }, "solution": [ { "lang": "eng", "value": "This product is no longer supported and the issue is not going to be fixed. The issue can be completely mitigated by ensuring that unprivileged users do not have \u0027create folder\u0027 access on the root of the filesystem such as C:\\ or on a folder named C:\\Common." } ], "source": { "defect": [ "PDV-1613" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "eng", "time": "2020-04-08T16:00:00.000Z", "value": "Initial publication" } ], "work_around": [ { "lang": "eng", "value": "This issue can be mitigated by :\n- Ensure unprivileged users do not have \u0027create folder\u0027 access on the root of filesystem such as C:\\.\nor\n- Creating a folder named C:\\Common and ensuring unprivileged users do not have \u0027create folder\u0027 access.\n" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:paloaltonetworks:secdo:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "ID": "CVE-2020-1984" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1984", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1984" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-04-10T14:16Z", "publishedDate": "2020-04-08T19:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…