
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in EyesOfNetwork 5.3 that allows privilege escalation through the sudoers configuration. The vulnerability (CVE-2020-8655) enables the apache user to execute arbitrary commands as root through a crafted NSE script for nmap 7 (NVD, CISA).
The vulnerability stems from an improper privilege management in the sudoers configuration of EyesOfNetwork 5.3. The apache user is granted NOPASSWD permissions to execute specific systemctl commands and nmap, which can be exploited through specially crafted Nmap Scripting Engine (NSE) scripts to execute arbitrary commands with root privileges (GitHub Issue).
Successful exploitation of this vulnerability allows an attacker with apache user access to elevate privileges to root level, potentially leading to complete system compromise. The attacker can execute arbitrary commands with the highest system privileges (Packet Storm).
Organizations should update their EyesOfNetwork installation to a patched version. Additionally, the sudoers configuration should be reviewed and modified to restrict the apache user's permissions, particularly regarding nmap execution (Check Point).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."