CVE-2021-33393
Published Jun 9, 2021
Last updated 2 years ago
Overview
- Description
- lfs/backup in IPFire 2.25-core155 does not ensure that /var/ipfire/backup/bin/backup.pl is owned by the root account. It might be owned by an unprivileged account, which could potentially be used to install a Trojan horse backup.pl script that is later executed by root. Similar problems with the ownership/permissions of other files may be present as well.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ipfire:ipfire:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBDDD8A7-E38C-4AAC-8728-3565419ED2FF", "versionEndExcluding": "2.25" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update141:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B87D3C8-FA28-4F85-AC09-2EFACD6C35BD" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update142:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1D81A88-D913-4F81-926B-77259697EC62" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update143:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22756F48-BFA7-4FAB-A5CB-AEFA07AE3CF0" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update144:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A269B061-848F-469C-A339-54562E3732E8" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update145:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FEDBF86-E999-49AE-B9CF-AEE5779CBCD0" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update146:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F8CED76-5D01-4E94-B2DF-EB956F011380" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update147:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F00892F6-77F8-46EA-AC9E-6B61D7774F44" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update148:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "795B8D36-67E1-441A-9F13-41A39F437AC0" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update149:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B0FED14-7C6D-4F36-BBA9-F56AF3A31959" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update150:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C614C0B1-F287-4E63-8D8F-23981375D582" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update151:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A308567-C944-4D70-9546-3BE15D89F0BE" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update152:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2E0CD0F-FF88-4EAC-9A5E-0C7DAD479973" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update155:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFC77F5A-4ADB-4B9F-899D-062B5053D29F" }, { "criteria": "cpe:2.3:a:ipfire:ipfire:2.25:core_update156:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0163A797-CA7A-4D4D-AFAE-1A9472F25627" } ], "operator": "OR" } ] } ]