Description
CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a setuid (and/or setgid) file. When a component is run as an argument of the runpicEhealth executable, the script code will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
ExploitThird Party Advisory
https://n4nj0.github.io/advisories/ca-ehealth-performance-manager/
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-03-26T07:15:13.230Z
4 years agoLast modified
2024-11-21T04:59:24.430Z
1 year ago