Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://issues.shibboleth.net/jira/browse/SSPCPP-874 | vendor advisory issue tracking |
https://bugzilla.suse.com/show_bug.cgi?id=1157471 | third party advisory issue tracking exploit |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00017.html | vendor advisory |