UNIX Symbolic Link (Symlink) Following Affecting performancecopilot/pcp package, versions [,6.3.1)
Threat Intelligence
EPSS
0.04% (6th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-PERFORMANCECOPILOTPCP-8062352
- published 20 Sep 2024
- disclosed 17 Sep 2024
- credit Unknown
Introduced: 17 Sep 2024
CVE-2024-45770 Open this link in a new tabHow to fix?
Upgrade performancecopilot/pcp
to version 6.3.1 or higher.
Overview
Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following due to the improper handling of symbolic links in the pmpost
tool. An attacker can escalate privileges and potentially corrupt files by creating symlinks in the /var/log/pcp
directory and manipulating the execution context of pmpost
.