pleaseedit in please before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://gitlab.com/edneville/please/-/tree/master/src/bin | third party advisory |
https://www.openwall.com/lists/oss-security/2021/05/18/1 | mailing list exploit third party advisory |