An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://github.com/EyesOfNetworkCommunity/eonconf/issues/8 | Exploit Third Party Advisory |
Configurations
History
01 Jan 2022, 19:57
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-0:*:*:*:*:*:*:* | |
First Time |
Eyesofnetwork eyesofnetwork
|
Information
Published : 2020-02-07 00:15
Updated : 2023-12-10 13:13
NVD link : CVE-2020-8655
Mitre link : CVE-2020-8655
CVE.ORG link : CVE-2020-8655
JSON object : View
Products Affected
eyesofnetwork
- eyesofnetwork
CWE
CWE-269
Improper Privilege Management