漏洞标题
N/A
漏洞描述信息
**争议** WampServer 3.0.6 安装了两个名为 'wampapache' 和 'wampmysqld' 的服务,具有弱的文件权限,以系统权限运行。这可能导致授权但非特权的本地用户能够在系统中执行任意代码并具有高级权限。要正确利用这个漏洞,本地攻击者必须插入一个名为 mysqld.exe 或 httpd.exe 的可执行文件,并替换原始文件。下次服务启动时,恶意文件将作为系统执行。注意:供应商否认这份报告的相关性,认为一个配置中“'someone'(攻击者)能够替换PC上的文件”并不是 "WampServer 的错误"。
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
WampServer 3.0.6 installs two services called 'wampapache' and 'wampmysqld' with weak file permissions, running with SYSTEM privileges. This could potentially allow an authorized but non-privileged local user to execute arbitrary code with elevated privileges on the system. To properly exploit this vulnerability, the local attacker must insert an executable file called mysqld.exe or httpd.exe and replace the original files. The next time the service starts, the malicious file will get executed as SYSTEM. NOTE: the vendor disputes the relevance of this report, taking the position that a configuration in which "'someone' (an attacker) is able to replace files on a PC" is not "the fault of WampServer.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
WampServer 安全漏洞
漏洞描述信息
WampServer是一套用于Windows平台的Apache、Mysql和PHP集成安装环境。 WampServer 3.0.6版本中的wampapache和wampmysqld服务存在安全漏洞,该漏洞源于程序对文件分配弱权限。本地攻击者可将mysqld.exe或httpd.exe可执行的文件替换源文件利用该漏洞以系统上提升的权限执行任意代码。
CVSS信息
N/A
漏洞类别
授权问题