First published: Thu Nov 05 2020(Updated: )
A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Nessus | >=8.9.0<=8.12.0 | |
Tenable Nessus Agent | =8.0.0 | |
Tenable Nessus Agent | =8.1.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5793 is a vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows that could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory.
An attacker could exploit CVE-2020-5793 by copying user-supplied files to a specially constructed path in a specifically named user directory.
The severity of CVE-2020-5793 is high with a severity score of 7.8.
Nessus versions 8.9.0 through 8.12.0 for Windows and Nessus Agent 8.0.0 and 8.1.0 for Windows are affected by CVE-2020-5793.
To fix CVE-2020-5793, it is recommended to update to a version of Nessus or Nessus Agent that is not affected by the vulnerability.