Skip to main content

CVE-1999-1536: .sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain

High
VulnerabilityCVE-1999-1536cve-1999-1536
Published: Fri Jul 30 1999 (07/30/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: acushop
Product: salesbuilder

Description

.sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain privileges by appending commands to the file.

AI-Powered Analysis

AILast updated: 06/27/2025, 18:55:13 UTC

Technical Analysis

CVE-1999-1536 describes a vulnerability in the AcuShop Salesbuilder product, specifically version 2.6, where the .sbstart startup script is configured with world-writable permissions. This misconfiguration allows any local user on the affected system to append arbitrary commands to the script. Because the script is executed with elevated privileges during startup, an attacker who can modify this file can escalate their privileges to gain full control over the system. The vulnerability is classified as a local privilege escalation issue, requiring local access but no authentication. The CVSS v2 score is 7.2 (high), reflecting the critical impact on confidentiality, integrity, and availability, as an attacker can execute arbitrary code with elevated privileges. No patch is available for this vulnerability, and there are no known exploits in the wild, likely due to the age of the product and the specific environment it runs in. The vulnerability arises from insecure file permissions, a common security misconfiguration that can be exploited by any local user with write access to the file system location of the script. Since the script is executed during startup, the attacker’s appended commands will run with the privileges of the startup process, typically root or an administrative user, enabling full system compromise.

Potential Impact

For European organizations using AcuShop Salesbuilder version 2.6, this vulnerability poses a significant risk of local privilege escalation. An attacker with local access—such as an insider threat, contractor, or someone who has gained limited access through other means—can exploit this vulnerability to gain administrative control over the system. This can lead to unauthorized access to sensitive business data, disruption of sales operations, and potential lateral movement within the network. The compromise of such systems could also impact compliance with European data protection regulations like GDPR, especially if personal data is involved. Given the lack of available patches, organizations face challenges in remediation, increasing the risk of prolonged exposure. The impact is particularly severe in environments where AcuShop Salesbuilder is integrated with critical business processes or handles sensitive financial information.

Mitigation Recommendations

Since no official patch is available, European organizations should implement compensating controls to mitigate this vulnerability. First, immediately audit and correct file permissions on the .sbstart startup script to restrict write access exclusively to trusted administrative users, removing world-writable permissions. Implement strict access controls and file integrity monitoring on startup scripts and other critical system files to detect unauthorized changes promptly. Limit local user accounts and enforce the principle of least privilege to reduce the number of users who can access and modify system files. Consider isolating or sandboxing the affected application environment to contain potential exploitation. Additionally, conduct regular security training to raise awareness about the risks of local privilege escalation and the importance of secure file permissions. If feasible, evaluate upgrading or migrating from AcuShop Salesbuilder 2.6 to a more secure and supported solution to eliminate exposure to this and other legacy vulnerabilities.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df134

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 6:55:13 PM

Last updated: 8/16/2025, 12:18:33 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats