Published: 07/02/2020 Updated: 03/03/2020
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in EyesOfNetwork 5.3. The sudoers configuration is prone to a privilege escalation vulnerability, allowing the apache user to run arbitrary commands as root via a crafted NSE script for nmap 7.

Vulnerability Trend


## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'EyesO ...

Mailing Lists

EyesOfNetwork version 53 suffers from code execution and remote SQL injection vulnerabilities ...

Github Repositories

EyesOfNetwork 5.1 to 5.3 exploits

eonrce EyesOfNetwork 51 to 53 exploits Theses two exploit files uses the following CVE's: CVE_number__ Description CVE-2020-8654 Discovery module to allows to run arbitrary OS commandsWe were able to run the id command with the following payload in the target field : ;id # CVE-2020-8655 LPE via nmap NSE scriptAs the apache user is allowed to run nmap as root, w