Privilege Escalation in v2rayL 2.1.3 via Misconfigured Configuration File

Privilege Escalation in v2rayL 2.1.3 via Misconfigured Configuration File

CVE-2020-10589 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.

Learn more about our User Device Pen Test.