• CVE-2022-1537

发布时间: 2022年8月5日

修改时间: 2022年8月5日

概要

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user s .bashrc file or replace /etc/shadow file if the GruntJS user is root.

CVSS v3 指标

NVD openEuler
CVSS评分 7.0 7.0
Attack Vector Local Local
Attack Complexity High High
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality High High
Integrity High High
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2022-1842 file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user s .bashrc file or replace /etc/shadow file if the GruntJS user is root. 2022年8月5日

影响产品

产品 状态
KY3.4-4A nodejs-grunt Unaffected
KY3.4-5 nodejs-grunt Unaffected
KY3.5.1 nodejs-grunt Unaffected