lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/68731 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2014/07/17/5 | third party advisory mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94744 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2014/07/07/14 | third party advisory mailing list |
http://www.vapid.dhs.org/advisories/VladTheEnterprising-0.2.html | third party advisory |