GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://www.gns3.com/ | vendor advisory |
https://github.com/GNS3/ubridge/commit/2eb0d1dab6a6de76cf3556130a2d52af101077db | third party advisory patch |
https://github.com/GNS3/gns3-server/releases/tag/v2.1.17 | third party advisory release notes |
https://theevilbit.github.io/posts/ | third party advisory exploit |