Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
7.8HIGH
EPSS
0.1%
top 75.50%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 29
Latest updateMay 13
Description
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 8.0
🔴Vulnerability Details
3GHSA▶
GHSA-g2wx-phqf-j84q: systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs↗2022-05-13
CVEList▶
CVE-2017-18078: systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs↗2018-01-29
OSV▶
CVE-2017-18078: systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs↗2018-01-29
💥Exploits & PoCs
1Exploit-DB
▶