vendor:
Sendfile
by:
psheep
7.2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Sendfile
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: UNIX
2001
Sendfile daemon local arbitrary command execution vulnerability
Sendfile is an implementation of the SAFT (simple asynchronous file transfer) protocol for UNIX systems. Due to a problem dropping privileges completely before running user-specified post-processing commands in the Sendfile daemon, it may be possible for a local user to execute arbitrary commands with elevated privileges.
Mitigation:
Ensure that the Sendfile daemon drops privileges completely before running user-specified post-processing commands.