Vulnerabilities > Improper Link Resolution Before File Access ('Link Following')

DATE CVE VULNERABILITY TITLE RISK
2018-03-12 CVE-2017-2619 Link Following vulnerability in multiple products
Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
network
high complexity
samba redhat debian CWE-59
7.5
2018-03-02 CVE-2015-0796 Link Following vulnerability in Opensuse Open Buildservice
In open buildservice 2.6 before 2.6.3, 2.5 before 2.5.7 and 2.4 before 2.4.8 the source service patch application could generate non-standard files like symlinks or device nodes, which could allow buildservice users to break of confinement or cause denial of service attacks on the source service.
local
low complexity
opensuse CWE-59
7.8
2018-03-01 CVE-2017-5188 Link Following vulnerability in Opensuse Open Build Service
The bs_worker code in open build service before 20170320 followed relative symlinks, allowing reading of files outside of the package source directory during build, allowing leakage of private information.
network
low complexity
opensuse CWE-59
7.5
2018-02-14 CVE-2017-18188 Link Following vulnerability in Openr Opentmpfiles
OpenRC opentmpfiles through 0.1.3, when the fs.protected_hardlinks sysctl is turned off, allows local users to obtain ownership of arbitrary files by creating a hard link inside a directory on which "chown -R" will be run.
local
low complexity
openr CWE-59
5.5
2018-02-13 CVE-2018-6954 Link Following vulnerability in multiple products
systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink.
local
low complexity
systemd-project canonical opensuse CWE-59
7.8
2018-02-09 CVE-2014-3219 Link Following vulnerability in multiple products
fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
local
low complexity
fishshell fedoraproject CWE-59
7.8
2018-01-29 CVE-2017-18078 Link Following vulnerability in multiple products
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
local
low complexity
systemd-project debian opensuse CWE-59
7.8
2018-01-25 CVE-2018-6198 Link Following vulnerability in multiple products
w3m through 0.5.3 does not properly handle temporary files when the ~/.w3m directory is unwritable, which allows a local attacker to craft a symlink attack to overwrite arbitrary files.
local
high complexity
tats canonical CWE-59
4.7
2018-01-20 CVE-2017-15111 Link Following vulnerability in Keycloak-Httpd-Client-Install Project Keycloak-Httpd-Client-Install
keycloak-httpd-client-install versions before 0.8 insecurely creates temporary file allowing local attackers to overwrite other files via symbolic link.
5.5
2018-01-10 CVE-2014-4996 Link Following vulnerability in Vladtheenterprising Project Vladtheenterprising 0.2.0
lib/vlad/dba/mysql.rb in the VladTheEnterprising gem 0.2 for Ruby allows local users to write to arbitrary files via a symlink attack on /tmp/my.cnf.#{target_host}.
local
low complexity
vladtheenterprising-project CWE-59
5.5