Логотип exploitDog
bind:CVE-2019-13228
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-13228

Количество 3

Количество 3

nvd логотип

CVE-2019-13228

больше 6 лет назад

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2019-13228

больше 6 лет назад

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootD ...

CVSS3: 4.7
EPSS: Низкий
github логотип

GHSA-4q9c-fvpx-pq67

больше 3 лет назад

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-13228

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-13228

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootD ...

CVSS3: 4.7
0%
Низкий
больше 6 лет назад
github логотип
GHSA-4q9c-fvpx-pq67

deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.

CVSS3: 4.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу