v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-03-15
Updated
2020-03-17
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-03-15
Updated
2020-03-17
2 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!