脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
Pcp: unsafe use of directories allows pcp to root privilege escalation
脆弱性説明
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
脆弱性タイプ
检查时间与使用时间(TOCTOU)的竞争条件
脆弱性タイトル
Performance Co-Pilot 安全漏洞
脆弱性説明
Performance Co-Pilot是一种开源软件基础架构,用于监视、可视化、记录、响应和控制网络、计算机、应用程序和服务器的状态、活动和性能。 Performance Co-Pilot (PCP) 存在安全漏洞,该漏洞源于不安全地使用目录权限,允许 pcp 升级到 root 权限。
CVSS情報
N/A
脆弱性タイプ
N/A