7.2
CVSSv2

CVE-2019-18276

Published: 28/11/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in disable_priv_mode in shell.c in GNU Bash up to and including 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu bash

gnu bash 5.0

netapp solidfire -

netapp hci management node -

netapp oncommand unified manager

oracle communications cloud native core policy 1.14.0

Exploits

An issue was discovered in disable_priv_mode in shellc in GNU Bash through 50 patch 11 By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID However, it does so incorrectly On Linux and other systems that support "saved UID" functionality, the saved UID ...

Github Repositories

Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images

Docker Scan ⚠️ The docker scan command has been removed To continue learning about the vulnerabilities of your images, and many other features, use the new docker scout command Run docker scout --help, or learn more at docsdockercom/engine/reference/commandline/scout/ Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and

Trivy setup using your CI tools

Setup Trivy in CI/CD tools Trivy is an image vulnerability scanner It detects vulnerabilties in OS packages and application dependencies Test trivy in MacOS Pull image: docker pull aquasec/trivy Scan your image: docker run --rm -v $HOME/Library/Caches:/root/cache/ aquasec/trivy [YOUR_IMAGE_NAME]

Trivy setup using your CI tools

Setup Trivy in CI/CD tools Trivy is an image vulnerability scanner It detects vulnerabilties in OS packages and application dependencies Test trivy in MacOS Pull image: docker pull aquasec/trivy Scan your image: docker run --rm -v $HOME/Library/Caches:/root/cache/ aquasec/trivy [YOUR_IMAGE_NAME]