| ID |
CVE-2016-10374
|
| Sažetak |
perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete. |
| Reference |
|
| CVSS |
| Base: | 2.1 |
| Impact: | 2.9 |
| Exploitability: | 3.9 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| NONE |
PARTIAL |
NONE |
|
| CVSS vektor |
AV:L/AC:L/Au:N/C:N/I:P/A:N |
| Zadnje važnije ažuriranje |
02-03-2020 - 18:50 |
| Objavljeno |
17-05-2017 - 19:29 |