When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.
Weaknesses in this category identify some of the underlying problems that commonly allow attackers to manipulate the business logic of an application. Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic errors can exhibit patterns that are similar to well-understood implementation and design weaknesses.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://hackerone.com/reports/1573634 | third party advisory exploit |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/ | mailing list third party advisory vendor advisory |
https://www.debian.org/security/2022/dsa-5197 | third party advisory vendor advisory |
https://security.netapp.com/advisory/ntap-20220915-0003/ | third party advisory |
https://support.apple.com/kb/HT213488 | third party advisory |
http://seclists.org/fulldisclosure/2022/Oct/41 | third party advisory mailing list |
http://seclists.org/fulldisclosure/2022/Oct/28 | third party advisory mailing list |
https://security.gentoo.org/glsa/202212-01 | third party advisory vendor advisory |