Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rm36-94g8-835r

Опубликовано: 11 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7

Описание

Race Condition in Grunt

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

Пакеты

Наименование

grunt

npm
Затронутые версииВерсия исправления

< 1.5.3

1.5.3

EPSS

Процентиль: 48%
0.00248
Низкий

7 High

CVSS3

Дефекты

CWE-367

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

CVSS3: 7.8
redhat
больше 3 лет назад

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

CVSS3: 7
nvd
больше 3 лет назад

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root.

CVSS3: 7
debian
больше 3 лет назад

file.copy operations in GruntJS are vulnerable to a TOCTOU race condit ...

EPSS

Процентиль: 48%
0.00248
Низкий

7 High

CVSS3

Дефекты

CWE-367