CVE-2020-13533

A privilege escalation vulnerability exists in Dream Report 5 R20-2. IIn the default configuration, the following registry keys, which reference binaries with weak permissions, can be abused by attackers to effectively ‘backdoor’ the installation files and escalate privileges when a new user logs in and uses the application.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dreamreport:dream_report:5_r20-2:*:*:*:*:*:*:*

History

30 Jul 2022, 03:44

Type Values Removed Values Added
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - Exploit, Technical Description, Third Party Advisory (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - Exploit, Third Party Advisory

Information

Published : 2021-04-09 18:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-13533

Mitre link : CVE-2020-13533

CVE.ORG link : CVE-2020-13533


JSON object : View

Products Affected

dreamreport

  • dream_report
CWE
CWE-276

Incorrect Default Permissions