{"api_version":"1","generated_at":"2026-04-22T23:30:33+00:00","cve":"CVE-2020-8026","urls":{"html":"https://cve.report/CVE-2020-8026","api":"https://cve.report/api/cve/CVE-2020-8026.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-8026","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-8026"},"summary":{"title":"CVE-2020-8026","description":"A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.","state":"PUBLIC","assigner":"security@suse.com","published_at":"2020-08-07 10:15:00","updated_at":"2023-01-24 02:58:00"},"problem_types":["CWE-276"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html","name":"openSUSE-SU-2020:1271","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1271-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1172573","name":"https://bugzilla.suse.com/show_bug.cgi?id=1172573","refsource":"CONFIRM","tags":["Issue Tracking","Vendor Advisory"],"title":"Bug 1172573 – VUL-0: CVE-2020-8026: inn: non-root owned files","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html","name":"openSUSE-SU-2020:1272","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1272-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html","name":"openSUSE-SU-2020:1427","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1427-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html","name":"openSUSE-SU-2020:1304","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:1304-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-8026","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8026","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Matthias Gerstner/Johannes Segitz of SUSE","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opensuse","cpe5":"backports_sle","cpe6":"15.0","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opensuse","cpe5":"backports_sle","cpe6":"15.0","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8026","vulnerable":"1","versionEndIncluding":"2.6.2-4.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"opensuse","cpe5":"tumbleweed","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@suse.com","DATE_PUBLIC":"2020-07-24T00:00:00.000Z","ID":"CVE-2020-8026","STATE":"PUBLIC","TITLE":"inn: non-root owned files"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"openSUSE Leap 15.2","version":{"version_data":[{"version_affected":"<=","version_name":"inn","version_value":"2.6.2-lp152.1.26"}]}},{"product_name":"openSUSE Tumbleweed","version":{"version_data":[{"version_affected":"<=","version_name":"inn","version_value":"2.6.2-4.2"}]}},{"product_name":"openSUSE Leap 15.1","version":{"version_data":[{"version_affected":"<=","version_name":"inn","version_value":"2.5.4-lp151.3.3.1"}]}}]},"vendor_name":"openSUSE"}]}},"credit":[{"lang":"eng","value":"Matthias Gerstner/Johannes Segitz of SUSE"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-276: Incorrect Default Permissions"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1172573","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1172573"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1271","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00064.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1272","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00063.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1304","url":"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00074.html"},{"refsource":"SUSE","name":"openSUSE-SU-2020:1427","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00038.html"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1172573","defect":["1172573"],"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2020-08-07 10:15:00","lastModifiedDate":"2023-01-24 02:58:00","problem_types":["CWE-276"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opensuse:tumbleweed:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.2-4.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"8026","Ordinal":"168352","Title":"CVE-2020-8026","CVE":"CVE-2020-8026","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"8026","Ordinal":"1","NoteData":"A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"8026","Ordinal":"2","NoteData":"2020-08-07","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"8026","Ordinal":"3","NoteData":"2020-09-18","Type":"Other","Title":"Modified"}]}}}