First published: Tue Jun 30 2020(Updated: )
HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HylaFAX+ | <=7.0.2 | |
Hylafax |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15397 is classified as a high severity vulnerability due to its potential to allow unprivileged users to execute arbitrary code.
To fix CVE-2020-15397, restrict write permissions on the affected directories to prevent unprivileged users from executing code.
CVE-2020-15397 affects HylaFAX+ versions up to and including 7.0.2 and HylaFAX Enterprise.
CVE-2020-15397 is a path traversal vulnerability that allows execution of binaries in writable directories.
Yes, unprivileged users can exploit CVE-2020-15397 to execute code due to insufficient permission restrictions on certain directories.