Z-Cron 5.6 Build 04 allows an unprivileged attacker to elevate privileges by modifying a privileged user's task. This can also affect all users who are signed in on the system if a shell is placed in a location that other unprivileged users have access to.
References
Link Resource
https://blog.spookysec.net/zcron/ Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-04-15T18:11:17

Updated: 2020-04-15T21:19:54

Reserved: 2020-04-15T00:00:00


Link: CVE-2020-11799

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-04-15T19:15:13.817

Modified: 2020-04-22T17:15:29.917


Link: CVE-2020-11799

JSON object: View

cve-icon Redhat Information

No data.

CWE