Vulnerability Name: | CVE-2013-2012 (CCN-83827) | ||||||||||||||||||||
Assigned: | 2013-04-26 | ||||||||||||||||||||
Published: | 2013-04-26 | ||||||||||||||||||||
Updated: | 2020-08-18 | ||||||||||||||||||||
Summary: | autojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P) 3.2 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-2012 Source: MISC Type: Mailing List http://www.openwall.com/lists/oss-security/2013/04/25/14 Source: CCN Type: BID-59498 autojump 'custom_install' Directory Local Privilege Escalation Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 950777 CVE-2013-2012 autojump: autojump profile will load random stuff from a directory called custom_install Source: MISC Type: Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2012 Source: MISC Type: Third Party Advisory, VDB Entry https://exchange.xforce.ibmcloud.com/vulnerabilities/83827 Source: XF Type: UNKNOWN autojump-cve20132012-priv-escalation(83827) Source: CCN Type: autojump GIT Repository joelthelion/autojump Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/wting/autojump/commit/ad09ee27d402be797b3456abff6edeb4291edfec Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/wting/autojump/commit/c763b2afadb188ab52849c21d43d2e8fe5b8800a Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2013-2012 Source: CCN Type: WhiteSource Vulnerability Database CVE-2013-2012 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |