Lucene search

K
cve[email protected]CVE-2020-13882
HistoryJun 18, 2020 - 6:15 p.m.

CVE-2020-13882

2020-06-1818:15:10
CWE-367
web.nvd.nist.gov
47
cisofy lynis
toctou race condition
access control
cve-2020-13882
nvd

3.7 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%

CISOfy Lynis before 3.0.0 has Incorrect Access Control because of a TOCTOU race condition. The routine to check the log and report file permissions was not working as intended and could be bypassed locally. Because of the race, an unprivileged attacker can set up a log and report file, and control that up to the point where the specific routine is doing its check. After that, the file can be removed, recreated, and used for additional attacks.

Affected configurations

NVD
Node
cisofylynisRange<3.0.0
Node
fedoraprojectfedoraMatch31
OR
fedoraprojectfedoraMatch32
CPENameOperatorVersion
cisofy:lyniscisofy lynislt3.0.0

3.7 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

4.2 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

4.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.9%