Show plain JSON{"containers": {"cna": {"affected": [{"product": "openSUSE Leap 15.2", "vendor": "openSUSE", "versions": [{"lessThanOrEqual": "2.6.2-lp152.1.26", "status": "affected", "version": "inn", "versionType": "custom"}]}, {"product": "openSUSE Tumbleweed", "vendor": "openSUSE", "versions": [{"lessThanOrEqual": "2.6.2-4.2", "status": "affected", "version": "inn", "versionType": "custom"}]}, {"product": "openSUSE Leap 15.1", "vendor": "openSUSE", "versions": [{"lessThanOrEqual": "2.5.4-lp151.3.3.1", "status": "affected", "version": "inn", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Matthias Gerstner/Johannes Segitz of SUSE"}], "datePublic": "2020-07-24T00:00:00", "descriptions": [{"lang": "en", "value": "A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-276", "description": "CWE-276: Incorrect Default Permissions", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2020-09-18T17:06:35", "orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1172573"}, {"name": "openSUSE-SU-2020:1271", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html"}, {"name": "openSUSE-SU-2020:1272", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html"}, {"name": "openSUSE-SU-2020:1304", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html"}, {"name": "openSUSE-SU-2020:1427", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html"}], "source": {"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1172573", "defect": ["1172573"], "discovery": "INTERNAL"}, "title": "inn: non-root owned files", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2020-07-24T00:00:00.000Z", "ID": "CVE-2020-8026", "STATE": "PUBLIC", "TITLE": "inn: non-root owned files"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "openSUSE Leap 15.2", "version": {"version_data": [{"version_affected": "<=", "version_name": "inn", "version_value": "2.6.2-lp152.1.26"}]}}, {"product_name": "openSUSE Tumbleweed", "version": {"version_data": [{"version_affected": "<=", "version_name": "inn", "version_value": "2.6.2-4.2"}]}}, {"product_name": "openSUSE Leap 15.1", "version": {"version_data": [{"version_affected": "<=", "version_name": "inn", "version_value": "2.5.4-lp151.3.3.1"}]}}]}, "vendor_name": "openSUSE"}]}}, "credit": [{"lang": "eng", "value": "Matthias Gerstner/Johannes Segitz of SUSE"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-276: Incorrect Default Permissions"}]}]}, "references": {"reference_data": [{"name": "https://bugzilla.suse.com/show_bug.cgi?id=1172573", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1172573"}, {"name": "openSUSE-SU-2020:1271", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html"}, {"name": "openSUSE-SU-2020:1272", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html"}, {"name": "openSUSE-SU-2020:1304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html"}, {"name": "openSUSE-SU-2020:1427", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html"}]}, "source": {"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1172573", "defect": ["1172573"], "discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T09:48:24.996Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1172573"}, {"name": "openSUSE-SU-2020:1271", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html"}, {"name": "openSUSE-SU-2020:1272", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html"}, {"name": "openSUSE-SU-2020:1304", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html"}, {"name": "openSUSE-SU-2020:1427", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html"}]}]}, "cveMetadata": {"assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "assignerShortName": "suse", "cveId": "CVE-2020-8026", "datePublished": "2020-08-07T09:25:13.939809Z", "dateReserved": "2020-01-27T00:00:00", "dateUpdated": "2024-09-16T16:57:41.593Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}