vendor:
Red Star OS
by:
Richard G
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Red Star OS
Affected Version From: Red Star OS 3.0
Affected Version To: Red Star OS 3.0
Patch Exists: NO
Related CWE: N/A
CPE: o:redstar:red_star_os:3.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2015
Red Star OS 3.0 Root Privilege Escalation Vulnerability
Red Star OS 3.0 is vulnerable to a privilege escalation vulnerability due to the Software Manager (swmng.app) running as root through sudo and allowing the installation of any RPM package, even if unsigned. An attacker can get root access by downloading a malicious RPM package, double-clicking it to open it with the Software Manager, and clicking through the blue buttons until it’s done. After that, running rootsh will give the attacker a root shell. SELinux can be disabled by running setenforce 0 as root.
Mitigation:
Disable the Software Manager (swmng.app) or restrict access to it.