storeBackup.pl in storeBackup through 3.5 relies on the /tmp/storeBackup.lock pathname, which allows symlink attacks that possibly lead to privilege escalation. (Local users can also create a plain file named /tmp/storeBackup.lock to block use of storeBackup until an admin manually deletes that file.)
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-7040 | third party advisory issue tracking |
http://www.openwall.com/lists/oss-security/2020/01/20/3 | third party advisory mailing list |
https://seclists.org/oss-sec/2020/q1/20 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/01/21/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/01/22/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/01/22/3 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2020/01/23/1 | third party advisory mailing list |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00054.html | patch vendor advisory mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2020/02/msg00003.html | third party advisory mailing list |
https://usn.ubuntu.com/4508-1/ | third party advisory vendor advisory |