pysec-2020-250
Vulnerability from pysec
Published
2020-06-19 11:15
Modified
2021-08-27 03:22
Details
Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
Impacted products
Name | purl |
---|---|
rtslib-fb | pkg:pypi/rtslib-fb |
Aliases
{ affected: [ { package: { ecosystem: "PyPI", name: "rtslib-fb", purl: "pkg:pypi/rtslib-fb", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "2.1.73", }, ], type: "ECOSYSTEM", }, ], versions: [ "2.1.31", "2.1.32", "2.1.35", "2.1.36", "2.1.37", "2.1.38", "2.1.39", "2.1.40", "2.1.43", "2.1.47", "2.1.49", "2.1.51", "2.1.56", "2.1.57", "2.1.58", "2.1.61", "2.1.62", "2.1.63", "2.1.64", "2.1.65", "2.1.66", "2.1.69", "2.1.71", "2.1.72", ], }, ], aliases: [ "CVE-2020-14019", ], details: "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.", id: "PYSEC-2020-250", modified: "2021-08-27T03:22:19.931800Z", published: "2020-06-19T11:15:00Z", references: [ { type: "WEB", url: "https://github.com/open-iscsi/rtslib-fb/pull/162", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.