Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6395— Mock: privilege escalation for users that can access mock configuration

CVSS 6.7 · Medium EPSS 0.67% · P71
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-6395

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Mock: privilege escalation for users that can access mock configuration
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Mock software contains a vulnerability wherein an attacker could potentially exploit privilege escalation, enabling the execution of arbitrary code with root user privileges. This weakness stems from the absence of proper sandboxing during the expansion and execution of Jinja2 templates, which may be included in certain configuration parameters. While the Mock documentation advises treating users added to the mock group as privileged, certain build systems invoking mock on behalf of users might inadvertently permit less privileged users to define configuration tags. These tags could then be passed as parameters to mock during execution, potentially leading to the utilization of Jinja2 templates for remote privilege escalation and the execution of arbitrary code as the root user on the build server.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mock 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mock是一个环境构建管理器。 Mock存在安全漏洞,该漏洞源于缺乏适当的沙箱,攻击者利用该漏洞可能进行权限升级,以root用户权限执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-mock--
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
FedoraExtra Packages for Enterprise Linux--
FedoraFedora--

II. Public POCs for CVE-2023-6395

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-6395

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-01-16 · 28 CVEs total

CVE-2023-340639.9 CRITICALVMware Aria Automation和VMware Cloud Foundation 安全漏洞
CVE-2024-06037.3 HIGHZhiCms giftcontroller.php deserialization
CVE-2011-100056.3 MEDIUMEasyFTP MKD Command buffer overflow
CVE-2024-05993.5 LOWJspxcms Document Management Page InfoController.java cross site scripting
CVE-2024-22626Supplier Management System 安全漏洞
CVE-2024-22916D-LINK Go-RT-AC750 安全漏洞
CVE-2023-51807OFCMS 安全漏洞
CVE-2023-36236Webkul Software Bagisto 安全漏洞
CVE-2023-52068kodbox 安全漏洞
CVE-2023-52042TOTOLINK X6000R 安全漏洞
CVE-2023-48926PrestaShop 安全漏洞
CVE-2023-39691kodbox 安全漏洞
CVE-2024-22628Sourcecodester Budget And Expense Tracker System 安全漏洞
CVE-2024-22627Supplier Management System 安全漏洞
CVE-2023-48104SOGo 安全漏洞
CVE-2024-22625Supplier Management System 安全漏洞
CVE-2024-22491beetl-bbs 安全漏洞
CVE-2023-52041TOTOLINK X6000R 安全漏洞
CVE-2023-49351Edimax BR6478AC 安全漏洞
CVE-2023-51810StackIdeas EasyDiscuss 安全漏洞

Showing top 20 of 28 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-6395

No comments yet


Leave a comment