Symlink Attack Affecting shadowsocks/shadowsocks-libev package, versions [3.0.0,3.1.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SHADOWSOCKSSHADOWSOCKSLIBEV-2366483
  • published26 Jan 2022
  • disclosed21 Nov 2019
  • creditUnknown

Introduced: 21 Nov 2019

CVE-2019-19191  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade shadowsocks/shadowsocks-libev to version 3.1.0 or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack. Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.

CVSS Scores

version 3.1