The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won't be fixed in the near future.
References
History

Thu, 12 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won't be fixed in the near future.
Title Privilege escalation through sudo misconfiguration
Weaknesses CWE-250
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2024-12-12T16:13:39.312Z

Reserved: 2024-03-05T09:15:40.201Z

Link: CVE-2024-28139

cve-icon Vulnrichment

Updated: 2024-12-12T16:13:31.293Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-11T16:15:09.930

Modified: 2024-12-12T17:15:10.010

Link: CVE-2024-28139

cve-icon Redhat

No data.