CVE-2024-48911
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
14/10/2024
Last modified:
17/10/2024
Description
OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its config file. Prior to version 0.9.4, where the config file is stored in an unprivileged user directory but the daemon is executed by root, it’s possible for the unprivileged user to change the config file and escalate permissions when root later runs the daemon. Version 0.9.4 contains a fix for the issue.
Impact
Base Score 4.0
5.80
Severity 4.0
MEDIUM
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:thinkst:opencanary:*:*:*:*:*:*:*:* | 0.9.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page