Description
pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.
References
https://gitlab.com/edneville/please/-/tree/master/src/bin
Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/05/18/1
ExploitMailing ListThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-05-27T13:15:08.140
4 years agoLast modified
2022-07-12T17:42:04.277
3 years ago