An issue was discovered in versions prior to 0.2.1 where usernames containing the `.` and `/` characters could result in the corruption of specific files on the filesystem. These files are named according to the username from which the sudo attempt is made (the origin user). Supporting this functionality is a set of session files (timestamps) for each user, stored in `/var/run/sudo-rs/ts`. Only once a configurable timeout has passed will the user have to re-authenticate themselves. Sudo-rs, a memory safe implementation of sudo and su, allows users to not have to enter authentication at every sudo attempt, but instead only requiring authentication every once in a while in every terminal or process group. There are no known workarounds for this vulnerability. This issue has been addressed in version 3.6.5. ` a similar method to modify the file content is also present. An attacker can exploit the directory traversal flaw using the provided URL to access and retrieve the contents of the file. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. A user can use the 'Job-Template' menu and create a playbook named 'test'. Logged-in users can access and modify the contents of any file on the system. JumpServer is an open source bastion host. An attacker could send a specially crafted URL request containing "dot dot" sequences (/./) to view arbitrary files on the system. IBM License Metric Tool 9.2 could allow a remote attacker to traverse directories on the system. because an attacker typically can't control when memory allocations fail." NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID. ** DISPUTED ** libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |