OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.
History

Thu, 17 Oct 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Thinkst
Thinkst opencanary
CPEs cpe:2.3:a:thinkst:opencanary:*:*:*:*:*:*:*:*
Vendors & Products Thinkst
Thinkst opencanary
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Tue, 15 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 21:00:00 +0000

Type Values Removed Values Added
Description OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.
Title OpenCanary Executes Commands From Potentially Writable Config File
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-14T20:45:57.810Z

Updated: 2024-10-15T14:44:42.093Z

Reserved: 2024-10-09T22:06:46.171Z

Link: CVE-2024-48911

cve-icon Vulnrichment

Updated: 2024-10-15T14:44:38.840Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T21:15:12.323

Modified: 2024-10-17T21:13:37.147

Link: CVE-2024-48911

cve-icon Redhat

No data.