RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://renderdoc.org/ | product |
https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt | third party advisory exploit |
http://seclists.org/fulldisclosure/2023/Jun/2 | mailing list third party advisory exploit |
http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html | third party advisory vdb entry exploit |
https://lists.debian.org/debian-lts-announce/2023/07/msg00023.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202311-10 | vendor advisory |