Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Pcp: unsafe use of directories allows pcp to root privilege escalation
Vulnerability Description
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Vulnerability Title
Performance Co-Pilot 安全漏洞
Vulnerability Description
Performance Co-Pilot是一种开源软件基础架构,用于监视、可视化、记录、响应和控制网络、计算机、应用程序和服务器的状态、活动和性能。 Performance Co-Pilot (PCP) 存在安全漏洞,该漏洞源于不安全地使用目录权限,允许 pcp 升级到 root 权限。
CVSS Information
N/A
Vulnerability Type
N/A