Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-32557

Опубликовано: 12 июн. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 3.6
CVSS3: 5.2

Описание

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

РелизСтатусПримечание
bionic

released

2.20.9-0ubuntu7.24
devel

released

2.20.11-0ubuntu67
esm-infra-legacy/trusty

released

2.14.1-0ubuntu3.29+esm7
esm-infra/bionic

released

2.20.9-0ubuntu7.24
esm-infra/focal

released

2.20.11-0ubuntu27.18
esm-infra/xenial

released

2.20.1-0ubuntu2.30+esm1
focal

released

2.20.11-0ubuntu27.18
groovy

released

2.20.11-0ubuntu50.7
hirsute

released

2.20.11-0ubuntu65.1
impish

released

2.20.11-0ubuntu67

Показывать по

EPSS

Процентиль: 18%
0.00058
Низкий

3.6 Low

CVSS2

5.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.2
nvd
больше 4 лет назад

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

github
больше 3 лет назад

It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.

EPSS

Процентиль: 18%
0.00058
Низкий

3.6 Low

CVSS2

5.2 Medium

CVSS3