CloudLinux CageFS 7.0.8-2 or below insufficiently restricts file paths supplied to the sendmail proxy command. This allows local users to read and write arbitrary files of certain file formats outside the CageFS environment.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/176791/CloudLinux-CageFS-7.0.8-2-Insufficiently-Restricted-Proxy-Command.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2024/Jan/25 | Exploit Mailing List Third Party Advisory |
https://blog.cloudlinux.com/lve-manager-lve-stats-lve-utils-and-alt-python27-cllib-have-been-rolled-out-to-100 | Release Notes |
https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-02_CloudLinux_CageFS_Insufficiently_Restricted_Proxy_Commands |
Configurations
History
No history.
Information
Published : 2024-01-22 15:15
Updated : 2024-03-28 19:15
NVD link : CVE-2020-36772
Mitre link : CVE-2020-36772
CVE.ORG link : CVE-2020-36772
JSON object : View
Products Affected
cloudlinux
- cagefs