CVE-2019-12209 — Link Following in Pam-u2f
Severity
7.5HIGHNVD
EPSS
0.6%
top 29.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 4
Latest updateMay 24
Description
Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/.config/Yubico/u2f_keys) as root (unless openasuser was enabled), and does not properly verify that the path lacks symlinks pointing to other files on the system owned by root. If the debug option is enabled in the PAM configuration, part of the file contents of a symlink target will be logged, possibly revealing sensitive information.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2019-12209: pam-u2f - Yubico pam-u2f 1.0.7 attempts parsing of the configured authfile (default $HOME/...↗2019
💬Community
3Bugzilla▶
CVE-2019-12209 pam-u2f: insecure debug file handling leads to information disclosure [fedora-all]↗2019-08-02
Bugzilla
▶
Bugzilla
▶