Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46708
HistoryMay 02, 2024 - 6:36 a.m.

Symlink Attack

2024-05-0206:36:22
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
9
symlink attack
salt
vulnerable
temporary files
local attacker
elevated privileges

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%

Salt is vulnerable to Symlink attacks. The vulnerability is due to insecure creation of temporary files in seed.py ,salt-ssh, or salt-cloud, which allows a local attacker to exploit this by creating symbolic links to overwrite arbitrary files with elevated privileges.

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.5

Confidence

High

EPSS

0

Percentile

5.1%