Vulnerability Description
An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eyesofnetwork | Eyesofnetwork | 5.3-0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-ExecutExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-CExploitThird Party AdvisoryVDB Entry
- https://github.com/EyesOfNetworkCommunity/eonconf/issues/8ExploitThird Party Advisory
- http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-ExecutExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/156605/EyesOfNetwork-AutoDiscovery-Target-CExploitThird Party AdvisoryVDB Entry
- https://github.com/EyesOfNetworkCommunity/eonconf/issues/8ExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-US Government Resource
FAQ
What is CVE-2020-8655?
CVE-2020-8655 is a vulnerability with a CVSS score of 7.8 (HIGH). An issue was discovered in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE s...
How severe is CVE-2020-8655?
CVE-2020-8655 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-8655?
Check the references section above for vendor advisories and patch information. Affected products include: Eyesofnetwork Eyesofnetwork.