Failure to normalize the umask in please before 0.4 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://gitlab.com/edneville/please/-/tree/master/src/bin | third party advisory |
https://www.openwall.com/lists/oss-security/2021/05/18/1 | mailing list exploit third party advisory |