ID |
CVE-2016-10374
|
Sažetak |
perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which allows local users to overwrite arbitrary files by creating a symlink, as demonstrated by creating a perltidy.ERR symlink that the victim cannot delete. |
Reference |
|
CVSS |
Base: | 2.1 |
Impact: | 2.9 |
Exploitability: | 3.9 |
|
Pristup |
Vektor | Složenost | Autentikacija |
LOCAL |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
PARTIAL |
NONE |
|
CVSS vektor |
AV:L/AC:L/Au:N/C:N/I:P/A:N |
Zadnje važnije ažuriranje |
02-03-2020 - 18:50 |
Objavljeno |
17-05-2017 - 19:29 |