Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2021-01-18 CVE-2020-36193 Link Following vulnerability in multiple products
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
network
low complexity
php fedoraproject debian drupal CWE-59
7.5
2021-01-13 CVE-2021-1145 Link Following vulnerability in Cisco Staros
A vulnerability in the Secure FTP (SFTP) of Cisco StarOS for Cisco ASR 5000 Series Routers could allow an authenticated, remote attacker to read arbitrary files on an affected device.
network
low complexity
cisco CWE-59
6.5
2021-01-13 CVE-2021-21602 Link Following vulnerability in Jenkins
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
network
low complexity
jenkins CWE-59
6.5
2021-01-12 CVE-2021-23240 Link Following vulnerability in multiple products
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target.
local
low complexity
sudo-project netapp fedoraproject CWE-59
7.8
2021-01-12 CVE-2021-23239 Link Following vulnerability in multiple products
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
2.5
2020-12-29 CVE-2020-27643 Link Following vulnerability in 1E Client 4.1.0.267/5.0.0.745
The %PROGRAMDATA%\1E\Client directory in 1E Client 5.0.0.745 and 4.1.0.267 allows remote authenticated users and local users to create and modify files in protected directories (where they would not normally have access to create or modify files) via the creation of a junction point to a system directory.
network
low complexity
1e CWE-59
6.5
2020-12-28 CVE-2020-27172 Link Following vulnerability in Gdatasoftware G Data
An issue was discovered in G-Data before 25.5.9.25 using Symbolic links, it is possible to abuse the infected-file restore mechanism to achieve arbitrary write that leads to elevation of privileges.
network
low complexity
gdatasoftware CWE-59
critical
9.8
2020-12-28 CVE-2020-35766 Link Following vulnerability in Opendkim
The test suite in libopendkim in OpenDKIM through 2.10.3 allows local users to gain privileges via a symlink attack against the /tmp/testkeys file (related to t-testdata.h, t-setup.c, and t-cleanup.c).
local
low complexity
opendkim CWE-59
7.8
2020-12-22 CVE-2020-28641 Link Following vulnerability in Malwarebytes Endpoint Protection and Malwarebytes
In Malwarebytes Free 4.1.0.56, a symbolic link may be used delete an arbitrary file on the system by exploiting the local quarantine system.
local
low complexity
malwarebytes CWE-59
7.1
2020-12-21 CVE-2020-26277 Link Following vulnerability in Dbdeployer
DBdeployer is a tool that deploys MySQL database servers easily.
network
high complexity
dbdeployer CWE-59
6.1