| ID |
CVE-2017-18348
|
| Sažetak |
Splunk Enterprise 6.6.x, when configured to run as root but drop privileges to a specific non-root account, allows local users to gain privileges by leveraging access to that non-root account to modify $SPLUNK_HOME/etc/splunk-launch.conf and insert Trojan horse programs into $SPLUNK_HOME/bin, because the non-root setup instructions state that chown should be run across all of $SPLUNK_HOME to give non-root access. |
| Reference |
|
| CVSS |
| Base: | 6.9 |
| Impact: | 10.0 |
| Exploitability: | 3.4 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:L/AC:M/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
03-10-2019 - 00:03 |
| Objavljeno |
19-10-2018 - 08:29 |