CVE-2021-20001

9.8 CRITICAL

📋 TL;DR

This vulnerability in debian-edu-config versions before 2.12.16 sets insecure permissions for user web shares (~/public_html), allowing local users to escalate privileges by accessing other users' web content. It affects Debian Edu (Skolelinux) installations where user web sharing is enabled. The insecure default configuration makes privilege escalation possible without requiring authentication.

💻 Affected Systems

Products:
  • debian-edu-config
Versions: Versions before 2.12.16
Operating Systems: Debian Linux, Debian Edu (Skolelinux)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where user web sharing (public_html directories) is enabled and configured through debian-edu-config.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to sensitive files in other users' public_html directories, potentially leading to full system compromise through privilege escalation chains.

🟠

Likely Case

Unauthorized users can read or modify web content in other users' public_html directories, potentially accessing sensitive information or defacing websites.

🟢

If Mitigated

With proper file permissions and access controls, impact is limited to authorized users only accessing their own web content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system. The vulnerability is in default configuration settings rather than code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.12.16 and later

Vendor Advisory: https://www.debian.org/security/2022/dsa-5072

Restart Required: No

Instructions:

1. Update debian-edu-config package: sudo apt update && sudo apt install debian-edu-config
2. Verify version is 2.12.16 or later: dpkg -l debian-edu-config
3. Review and adjust existing public_html directory permissions if needed.

🔧 Temporary Workarounds

Manual permission correction

linux

Manually set secure permissions on existing public_html directories

find /home -name public_html -type d -exec chmod 0751 {} \;
find /home -name public_html -type d -exec chown :www-data {} \;

🧯 If You Can't Patch

  • Disable user web sharing functionality if not required
  • Implement strict file permission monitoring and auditing for public_html directories

🔍 How to Verify

Check if Vulnerable:

Check debian-edu-config version: dpkg -l debian-edu-config | grep ^ii | awk '{print $3}' - versions before 2.12.16 are vulnerable

Check Version:

dpkg -l debian-edu-config | grep ^ii | awk '{print $3}'

Verify Fix Applied:

Verify version is 2.12.16 or later and check public_html directory permissions: ls -ld ~/public_html

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to public_html directories
  • Permission changes to web directories

Network Indicators:

  • Unusual web traffic patterns from local users

SIEM Query:

source="auth.log" AND ("permission denied" OR "access denied") AND "public_html"

🔗 References

📤 Share & Export