{"id":"CVE-2020-15397","details":"HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).","modified":"2026-03-15T22:34:10.051387Z","published":"2020-06-30T12:15:12.507Z","related":["MGASA-2020-0356","openSUSE-SU-2020:1209-1","openSUSE-SU-2020:1210-1","openSUSE-SU-2020:1231-1","openSUSE-SU-2020:1438-1","openSUSE-SU-2024:10852-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00054.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J52QFVREJWJ35YSEEDDRMZQ2LM2H2WE6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y46FOVJUS5SO44A2VEKR7DXEHTI4WK5L/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00040.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00046.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00039.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202007-06"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1173519"},{"type":"FIX","url":"https://sourceforge.net/p/hylafax/HylaFAX+/2534/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15397.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0.2"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}