Описание
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
Ссылки
- Third Party Advisory
- Broken Link
- Mailing List
- Permissions Required
- ExploitIssue Tracking
- ExploitIssue Tracking
- Third Party Advisory
- Broken Link
- Mailing List
- Permissions Required
- ExploitIssue Tracking
- ExploitIssue Tracking
Уязвимые конфигурации
Одно из
EPSS
7.8 High
CVSS3
4.4 Medium
CVSS2
Дефекты
Связанные уязвимости
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
The g_file_copy function in glib 2.0 sets the permissions of a target ...
The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory.
EPSS
7.8 High
CVSS3
4.4 Medium
CVSS2