CVE-2009-4648
Published Feb 19, 2010
Last updated 7 years ago
Overview
- Description
- Accellion Secure File Transfer Appliance before 8_0_105 does not properly restrict access to sensitive commands and arguments that run with extra sudo privileges, which allows local administrators to gain privileges via (1) arbitrary arguments in the --file_move action in /usr/local/bin/admin.pl, or a hard link attack in (2) chmod or (3) a certain cp command.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_135:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59DB02D8-8C89-48C6-9365-1AA8FEB88C15" }, { "criteria": "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_178:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6346A19A-A191-4EFA-A3F2-DF030BD417FF" }, { "criteria": "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_189:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2916296B-1468-478F-91A9-48B040795AC4" }, { "criteria": "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_259:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B04D3329-1966-4867-A594-228417554E46" }, { "criteria": "cpe:2.3:h:accellion:secure_file_transfer_appliance:7_0_296:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E4B98B8-7BD2-401F-BC12-6A0120FB950E" } ], "operator": "OR" } ] } ]