The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won't be fixed in the near future.
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won't be fixed in the near future.
Title Privilege escalation through sudo misconfiguration
Weaknesses CWE-250
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-11T15:36:49.878Z

Updated: 2025-11-03T21:54:22.037Z

Reserved: 2024-03-05T09:15:40.201Z

Link: CVE-2024-28139

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:22.037Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-11T16:15:09.930

Modified: 2025-11-03T22:16:49.623

Link: CVE-2024-28139

cve-icon Redhat

No data.