raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
References
Link | Resource |
---|---|
https://github.com/RaspAP/raspap-webgui | Product |
https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers | Third Party Advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | Exploit Third Party Advisory URL Repurposed |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory, URL Repurposed |
02 Sep 2021, 16:26
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 | |
CPE | cpe:2.3:a:raspap:raspap:2.6.6:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
References | (MISC) https://github.com/RaspAP/raspap-webgui - Product | |
References | (MISC) https://zerosecuritypenetrationtesting.com/?page_id=306 - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers - Third Party Advisory |
24 Aug 2021, 13:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-24 13:15
Updated : 2024-02-14 01:17
NVD link : CVE-2021-38557
Mitre link : CVE-2021-38557
CVE.ORG link : CVE-2021-38557
JSON object : View
Products Affected
raspap
- raspap
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource