A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.
                
            References
                    | Link | Resource | 
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 | Exploit Technical Description Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 | Exploit Technical Description Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:01
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1154 - Exploit, Technical Description, Third Party Advisory | 
Information
                Published : 2020-12-03 17:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13542
Mitre link : CVE-2020-13542
CVE.ORG link : CVE-2020-13542
JSON object : View
Products Affected
                logicaldoc
- logicaldoc
CWE
                
                    
                        
                        CWE-276
                        
            Incorrect Default Permissions
