CVE-2013-4482

Severity

62%

Complexity

19%

Confidentiality

165%

http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"

Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.

http://cwe.mitre.org/data/definitions/426.html "CWE-426: Untrusted Search Path"

CVSS 2.0 Base Score 6.2. CVSS Attack Vector: local. CVSS Attack Complexity: high. CVSS Vector: (AV:L/AC:H/Au:N/C:C/I:C/A:C).

Overview

First reported 11 years ago

2013-11-23 11:55:00

Last updated 5 years ago

2019-04-22 17:48:00

Affected Software

scientificlinux Luci 0.26.0

0.26.0

Red Hat Enterprise Linux 6.0

6.0

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.