CVE-2024-41637:
RaspAP allows an attacker to escalate privileges
10
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.26893%
CWE
Published
7/29/2024
Updated
8/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
billz/raspap-webgui | composer | <= 3.1.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key factors:
- Improper file permissions: The restapi.service file is writable by www-data, allowing modification of systemd service commands.
- Excessive sudo privileges: www-data can execute systemctl and reboot commands without authentication.
While specific function names aren't provided in the advisory, the attack flow demonstrates that:
- The ability to modify restapi.service (CWE-269) enables command injection via service configuration (CWE-77)
- Sudo privileges allow these modified commands to execute as root These manifest in the systemd service definition and sudoers configuration files rather than discrete application functions, as the vulnerability is primarily a misconfiguration issue.