Symlink Attack Affecting rpm-software-management/rpm package, versions [,4.13.0.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-RPMSOFTWAREMANAGEMENTRPM-2377256
  • published26 Jan 2022
  • disclosed22 Nov 2017
  • creditUnknown

Introduced: 22 Nov 2017

CVE-2017-7501  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade rpm-software-management/rpm to version 4.13.0.3 or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack. It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.

References

CVSS Base Scores

version 3.1