vendor:
wmapm
by:
kokanin
7.2
CVSS
HIGH
Local Privilege Escalation
264
CWE
Product Name: wmapm
Affected Version From: 3.1
Affected Version To: 3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:wmapm:wmapm:3.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: FreeBSD
2002
wmapm Local Privilege Escalation Vulnerability
wmapm has been reported prone to a local privilege escalation vulnerability. The vulnerability has been conjectured to result from a lack of relative path usage while the vulnerable dock app is invoking a third party binary. As a result of this, a local attacker may manipulate local path settings and have the setuid wmapm dock app erroneously invoke a trojan binary that is located in a directory that the attacker has permissions to write to.
Mitigation:
Ensure that relative paths are used when invoking third party binaries.