发布时间: 2022年8月5日
修改时间: 2022年8月5日
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user s .bashrc file or replace /etc/shadow file if the GruntJS user is root.
NVD | openEuler | |
---|---|---|
CVSS评分 | 7.0 | 7.0 |
Attack Vector | Local | Local |
Attack Complexity | High | High |
Privileges Required | Low | Low |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1842 | file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user s .bashrc file or replace /etc/shadow file if the GruntJS user is root. | 2022年8月5日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | nodejs-grunt | Unaffected |
KY3.4-5 | nodejs-grunt | Unaffected |
KY3.5.1 | nodejs-grunt | Unaffected |