7.2
CVSSv2

CVE-2020-15397

Published: 30/06/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

HylaFAX+ up to and including 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hylafax\\+ project hylafax\\+

ifax hylafax enterprise -

Vendor Advisories

Debian Bug report logs - #964198 CVE-2020-15397 CVE-2020-15396 Package: src:hylafax; Maintainer for src:hylafax is Giuseppe Sacco <eppesuig@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 3 Jul 2020 14:00:02 UTC Severity: important Tags: security, upstream Found in version hylafax/3:607-3 ...
HylaFAX+ through 702 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (eg, locations under /var/spool/hylafax that are writable by the uucp account) This allows these users to execute code in the context of the user calling these binaries (often root) ...