Privilege Escalation in v2rayL 2.1.3 via Sudo Misconfiguration

Privilege Escalation in v2rayL 2.1.3 via Sudo Misconfiguration

CVE-2020-10588 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.

Learn more about our User Device Pen Test.