A flaw was found in pritunl-client before version 1.0.1116.6. Arbitrary write to user specified path may lead to privilege escalation.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6%2C | |
https://lf.lc/CVE-2016-7063.txt | third party advisory exploit |
https://github.com/pritunl/pritunl-client-electron/releases/tag/1.0.1116.6 | third party advisory release notes |