Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:opservices:opmon:9.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E07AF095-7382-430B-BC92-EDE4ED539FCE", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in OpServices OpMon 9.3.2. Starting from the apache user account, it is possible to perform privilege escalation through the lack of correct configuration in the server's sudoers file, which by default allows the execution of programs (e.g. nmap) without the need for a password with sudo."}, {"lang": "es", "value": "Se detect\u00f3 un problema en OpServices OpMon versi\u00f3n 9.3.2. A partir de la cuenta de usuario apache, es posible realizar una escalada de privilegios mediante la falta de configuraci\u00f3n correcta en el archivo sudoers del servidor, que por defecto permite una ejecuci\u00f3n de programas (por ejemplo, nmap) sin la necesidad de una contrase\u00f1a con sudo."}], "id": "CVE-2020-7954", "lastModified": "2024-11-21T05:38:04.953", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-02-06T17:15:14.600", "references": [{"source": "cve@mitre.org", "url": "https://medium.com/%40ph0rensic"}, {"source": "cve@mitre.org", "url": "https://medium.com/%40ph0rensic/three-cves-on-opmon-3ca775a262f5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40ph0rensic"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40ph0rensic/three-cves-on-opmon-3ca775a262f5"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}