Files or Directories Accessible to External Parties Affecting www.velocidex.com/golang/velociraptor/vql/parsers/journald package, versions *


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-WWWVELOCIDEXCOMGOLANGVELOCIRAPTORVQLPARSERSJOURNALD-8356865
  • published 8 Nov 2024
  • disclosed 7 Nov 2024
  • credit Jean-Baptiste Mesnard-Sense

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties due to the creation of the installation directory with WRITE_DACL permission to the BUILTIN\Users group. An attacker can subvert the binary and cause the service to execute arbitrary code as the SYSTEM user or replace the binary completely by modifying the service's files.

Note:

This is only exploitable if the attacker has local access and is part of the BUILTIN\Users group.

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
8.6 high
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Active
  • Automatable (AU)
    Yes
  • Recovery (R)
    Unreliable
  • Value Density (V)
    Distributed
  • Vulnerability Response Effort (RE)
    Low
  • Provider Urgency (U)
    Red
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    High
  • Confidentiality (SC)
    High
  • Integrity (SI)
    High
  • Availability (SA)
    High