Vulnerability Details : CVE-2020-36771
Potential exploit
CloudLinux CageFS 7.1.1-1 or below passes the authentication token as a command line argument. In some configurations this allows local users to view the authentication token via the process list and gain code execution as another user.
Products affected by CVE-2020-36771
- cpe:2.3:a:cloudlinux:cagefs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36771
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36771
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-01-29 |
CWE ids for CVE-2020-36771
-
A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by other processes on the operating system.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2020-36771
-
https://blog.cloudlinux.com/cagefs-lve-wrappers-and-bsock-have-been-rolled-out-to-100
CageFS, LVE Wrappers, and bsock have been rolled out to 100%Release Notes
-
http://packetstormsecurity.com/files/176790/CloudLinux-CageFS-7.1.1-1-Token-Disclosure.html
CloudLinux CageFS 7.1.1-1 Token Disclosure ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2024/Jan/24
Full Disclosure: [SBA-ADV-20200707-01] CVE-2020-36771: CloudLinux CageFS 7.1.1-1 or below Token DisclosureExploit;Mailing List;Third Party Advisory
-
https://github.com/sbaresearch/advisories/tree/public/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure
advisories/2020/SBA-ADV-20200707-01_CloudLinux_CageFS_Token_Disclosure at public · sbaresearch/advisories · GitHub
Jump to