CVE-2013-2029Link Following in Redhat Openstack

Severity
6.3MEDIUMNVD
EPSS
0.0%
top 91.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 23
Latest updateMay 17

Description

nagios.upgrade_to_v3.sh, as distributed by Red Hat and possibly others for Nagios Core 3.4.4, 3.5.1, and earlier, allows local users to overwrite arbitrary files via a symlink attack on a temporary nagioscfg file with a predictable name in /tmp/.

CVSS vector

AV:L/AC:M/C:N/I:C/A:CExploitability: 3.4 | Impact: 9.2

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-8727-34w8-v299: nagios2022-05-17
CVEList
CVE-2013-2029: nagios2013-11-23

📋Vendor Advisories

1
Red Hat
core: Insecure temporary file usage in nagios.upgrade_to_v3.sh2013-04-30

💬Community

1
Bugzilla
CVE-2013-2029 Nagios core: Insecure temporary file usage in nagios.upgrade_to_v3.sh2013-04-30
CVE-2013-2029 — Link Following in Redhat Openstack | cvebase