CVE-2020-13533

A privilege escalation vulnerability exists in Dream Report 5 R20-2. IIn the default configuration, the following registry keys, which reference binaries with weak permissions, can be abused by attackers to effectively ‘backdoor’ the installation files and escalate privileges when a new user logs in and uses the application.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dreamreport:dream_report:5_r20-2:*:*:*:*:*:*:*

History

30 Jul 2022, 03:44

Type Values Removed Values Added
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - Exploit, Technical Description, Third Party Advisory (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - Exploit, Third Party Advisory

14 Apr 2021, 18:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.4
v3 : 7.8
References (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - (MISC) https://talosintelligence.com/vulnerability_reports/TALOS-2020-1146 - Exploit, Technical Description, Third Party Advisory
CWE CWE-276
CPE cpe:2.3:a:dreamreport:dream_report:5_r20-2:*:*:*:*:*:*:*

09 Apr 2021, 18:54

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-09 18:15

Updated : 2023-12-10 13:55


NVD link : CVE-2020-13533

Mitre link : CVE-2020-13533

CVE.ORG link : CVE-2020-13533


JSON object : View

Products Affected

dreamreport

  • dream_report
CWE
CWE-276

Incorrect Default Permissions