| ID |
CVE-2019-9686
|
| Sažetak |
pacman before 5.1.3 allows directory traversal when installing a remote package via a specified URL "pacman -U <url>" due to an unsanitized file name received from a Content-Disposition header. pacman renames the downloaded package file to match the name given in this header. However, pacman did not sanitize this name, which may contain slashes, before calling rename(). A malicious server (or a network MitM if downloading over HTTP) can send a Content-Disposition header to make pacman place the file anywhere in the filesystem, potentially leading to arbitrary root code execution. Notably, this bypasses pacman's package signature checking. This occurs in curl_download_internal in lib/libalpm/dload.c. |
| Reference |
|
| CVSS |
| Base: | 9.3 |
| Impact: | 10.0 |
| Exploitability: | 8.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:M/Au:N/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
09-11-2020 - 21:45 |
| Objavljeno |
11-03-2019 - 16:29 |