Описание
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*
cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.00638
Низкий
6.4 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The Log Viewer function in the Check Point FireWall-1 GUI for Solaris 3.0b through 4.1 SP2 does not check for the existence of '.log' files when saving files, which allows (1) remote authenticated users to overwrite arbitrary files ending in '.log', or (2) local users to overwrite arbitrary files via a symlink attack.
EPSS
Процентиль: 70%
0.00638
Низкий
6.4 Medium
CVSS2
Дефекты
NVD-CWE-Other