Vulnerability Details : CVE-2020-11498
Slack Nebula through 1.1.0 contains a relative path vulnerability that allows a low-privileged attacker to execute code in the context of the root user via tun_darwin.go or tun_windows.go. A user can also use Nebula to execute arbitrary code in the user's own context, e.g., for user-level persistence or to bypass security controls. NOTE: the vendor states that this "requires a high degree of access and other preconditions that are tough to achieve."
Vulnerability category: Directory traversalExecute code
Products affected by CVE-2020-11498
- cpe:2.3:a:slack:nebula:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-11498
0.21%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-11498
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2020-11498
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-11498
-
http://www.pwn3d.org/posts/7918501-slack-nebula-relative-path-bug-bounty-disclosure
Slack Nebula - Relative Path Bug Bounty Disclosure (Med: $750) « pwn3d.orgExploit;Third Party Advisory
-
https://github.com/slackhq/nebula/pull/191
use absolute paths on darwin and windows by wadey · Pull Request #191 · slackhq/nebula · GitHubPatch;Third Party Advisory
Jump to