Issues were discovered in Open DHCP Server (Regular) 1.75 and Open DHCP Server (LDAP Based) 0.1Beta. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenDHCPServer.exe (Regular) or the OpenDHCPLdap.exe (LDAP Based) binary.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://sourceforge.net/projects/dhcpserver/ | product |
https://github.com/an0ry/advisories | third party advisory exploit |
https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26131.md |