CVE-2024-41637

RaspAP before 3.1.5 allows an attacker to escalate privileges: the www-data user has write access to the restapi.service file and also possesses Sudo privileges to execute several critical commands without a password.
Configurations

No configuration.

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://blog.0xzon.dev/2024-07-27-CVE-2024-41637/ - () https://blog.0xzon.dev/2024-07-27-CVE-2024-41637/ -
References () https://github.com/RaspAP/raspap-webgui - () https://github.com/RaspAP/raspap-webgui -

01 Aug 2024, 13:59

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.3
CWE CWE-77

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) RaspAP anterior a 3.1.5 permite a un atacante escalar privilegios: el usuario www-data tiene acceso de escritura al archivo restapi.service y también posee privilegios Sudo para ejecutar varios comandos críticos sin contraseña.

29 Jul 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 06:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41637

Mitre link : CVE-2024-41637

CVE.ORG link : CVE-2024-41637


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')