CVE-2019-13229
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
deepin-clone before 1.1.3 uses a fixed path /tmp/partclone.log in the Helper::getPartitionSizeInfo() function to write a log file as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
deepin-clone anterior a versión 1.1.3, utiliza una ruta (path) fija /tmp/partclone.log en la función Helper::getPartitionSizeInfo() para escribir un archivo de registro como root, y sigue ahí los enlaces simbólicos (symlinks). Un usuario sin privilegios puede preparar ahí un ataque de enlace simbólico para crear o sobrescribir archivos en ubicaciones del sistema de archivos arbitrarias. El contenido no es controlado por el atacante.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-07-04 CVE Reserved
- 2019-07-04 CVE Published
- 2024-06-27 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/07/04/1 | Mailing List | |
https://bugzilla.suse.com/show_bug.cgi?id=1130388 | Issue Tracking |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Deepin Search vendor "Deepin" | Deepin Clone Search vendor "Deepin" for product "Deepin Clone" | < 1.1.3 Search vendor "Deepin" for product "Deepin Clone" and version " < 1.1.3" | - |
Affected
|