lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
3.3low severity
AV:L/AC:M/Au:N/C:N/I:P/A:P
08/05/2014
Products1
Emacs
by Gnu
112 Versions
10 months ago
Operating Systems1
Ma
Mageia
by Mageia Project
11 Versions
9 years ago
Vulnerability Categories1
Improper Link Resolution Before File Access ('Link Following')
http://www.vicarius.io
is owned and operated by Vicarius Ltd. (the “Company”). All information contained on the
Website is purely for informational, and educational purposes and should be independently
verified and confirmed. Vicarius does not accept any liability for any loss or damage
whatsoever caused in reliance upon such information or services. No statements or information
presented in any form by Vicarius is intended as fact, and you agree that you will not
consider the statements or information presented on the Website as fact or as a guarantee of
performance.
Related CVEs
Security Research Topics
By Vicarius Studios .
Mar 28, 2024
The Easter Patch Hunt ft. Santa and the Three Sysadmins
By David Parkinson Frost
Mar 21, 2024
David Rambles on Copilot and GPU Spies
By The Meme Bot
Mar 14, 2024
By Shivam Bathla
Mar 10, 2024
Unveiling CVE-2024-21501: Pursuing the abyss - Understanding and exploiting sanitize-html vulnerability, patch, and the root-cause!
Versions below 2.12.1 of the package sanitize-html are vulnerable to path disclosure when used on the backend and with the style attribute allowed, allowing verifying files and folder existence on the system (including project dependencies). An attacker could leverage this vulnerability to gather details about the file system structure and dependencies to perform more targeted attacks against the server. This post details the process of diving into the source code to uncover the root-cause and reveal how insecure usage of the third-party package could lead to seemingly innocuous yet noxious bugs.