CVE-2020-15397

HIGH

HylaFAX+ <7.0.2 - Code Injection

Title source: llm
STIX 2.1

Description

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

References (9)

Core 9
Core References
Patch, Third Party Advisory x_refsource_misc
https://sourceforge.net/p/hylafax/HylaFAX+/2534/
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.suse.com/show_bug.cgi?id=1173519
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/202007-06

Scores

CVSS v3 7.8
EPSS 0.0023
EPSS Percentile 45.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-732
Status published
Products (2)
hylafax\+_project/hylafax\+ < 7.0.2
ifax/hylafax_enterprise
Published Jun 30, 2020
Tracked Since Feb 18, 2026