DNA View

CVE-2020-8013

Low
Low Medium High Critical
2.2
CVSS Score
Published: Mar 02, 2020
Last Modified: Nov 21, 2024

Vulnerability Description

A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
Attack Vector
L
Attack Complexity
H
Privileges Required
L
User Interaction
R
Scope
U
Confidentiality
N
Integrity
L
Availability
N

Known Affected Software

4 configuration(s) from 2 vendor(s)

leap
Version:
15.1
CPE:
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
linux_enterprise_server
Version:
12
CPE:
cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:-:*:*:*
linux_enterprise_server
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*
linux_enterprise_server
Version:
15
CPE:
cpe:2.3:o:suse:linux_enterprise_server:15:-:*:*:*:*:*:*
This vulnerability affects 4 software configuration(s). Ensure you patch all affected systems.

Severity Details

2.2
out of 10.0
Low

Weakness Type (CWE)

CWE-59

Improper Link Resolution Before File Access ('Link Following')

Description
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Exploit Likelihood
Medium
Typical Severity
Medium
Abstraction Level
Base

Key Information

Published Date
March 02, 2020