Using the install assessment functionality an attacker can feed a Tar file that contain files with paths pointing outside of the target directory (e.g., `././././tmp/tarslipped1.sh`). To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. A Tar slip vulnerability was found in the Install assessment functionality of Autolab. It relies on the /tmp/RenderDoc directory regardless of ownership.Īutolab is a course management service that enables auto-graded programming assignments. RenderDoc before 1.27 allows local privilege escalation via a symlink attack. Both of these are typically world-writable, and thus (for example) an attacker can modify imapsync's cache and overwrite files belonging to the user who runs it. Imapsync through 2.229 uses predictable paths under /tmp and /var/tmp in its default mode of operation. This affects N-Series N1115 Wallplate Video Encoder before 1.15.61, N-Series N1x22A Video Encoder/Decoder before 1.15.61, N-Series N1x33A Video Encoder/Decoder before 1.15.61, N-Series N1x33 Video Encoder/Decoder before 1.15.61, N-Series N2x35 Video Encoder/Decoder before 1.15.61, N-Series N2x35A Video Encoder/Decoder before 1.15.61, N-Series N2xx2 Video Encoder/Decoder before 1.15.61, N-Series N2xx2A Video Encoder/Decoder before 1.15.61, N-Series N3000 Video Encoder/Decoder before 2.12.105, and N-Series N4321 Audio Transceiver before 1.00.06. The web interface on multiple Samsung Harman AMX N-Series devices allows directory listing for the /tmp/ directory, without authentication, exposing sensitive information such as the command history and screenshot of the file being processed. OPNsense before 23.7 was discovered to contain insecure permissions in the directory /tmp.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |