{ "schema_version": "1.4.0", "id": "GHSA-g575-5h4r-77p9", "modified": "2022-05-24T17:21:44Z", "published": "2022-05-24T17:21:44Z", "aliases": [ "CVE-2020-15351" ], "details": "IDrive before 6.7.3.19 on Windows installs by default to %PROGRAMFILES(X86)%\\IDriveWindows with weak folder permissions granting any user modify permission (i.e., NT AUTHORITY\\Authenticated Users:(OI)(CI)(M)) to the contents of the directory and its sub-folders. In addition, the program installs a service called IDriveService that runs as LocalSystem. Thus, any standard user can escalate privileges to NT AUTHORITY\\SYSTEM by substituting the service's binary with a malicious one.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15351" }, { "type": "WEB", "url": "https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-004.md" }, { "type": "WEB", "url": "https://www.idrive.com/release-info#win" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-26T19:15:00Z" } }