You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- fixed: 2020.8.1
packages:
- package: github.com/cloudflare/cloudflared
description: In `cloudflared` versions < 2020.8.1 on Windows, if an administrator
has started `cloudflared` and set it to read configuration files from a certain
directory, an unprivileged user can exploit a misconfiguration in order to escalate
privileges and execute system-level commands. The misconfiguration was due to
the way that `cloudflared` reads its configuration file. One of the locations
that `cloudflared` reads from (C:\etc\) is not a secure by default directory due
to the fact that Windows does not enforce access controls on this directory without
further controls applied. A malformed config.yaml file can be written by any user.
Upon reading this config, `cloudflared` would output an error message to a log
file defined in the malformed config. The user-controlled log file location could
be set to a specific location that Windows will execute when any user logs in.
cves:
- CVE-2020-24356
ghsas:
- GHSA-hgwp-4vp4-qmm2
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-hgwp-4vp4-qmm2, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: