CVE-2019-3693Link Following in Linux Enterprise Server 11

CWE-59Link Following3 documents3 sources
Severity
7.8HIGHNVD
CNA7.7
EPSS
0.2%
top 61.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 24
Latest updateMay 24

Description

A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

CVEListV5suse/suse_linux_enterprise_server_11mailman2.1.15-9.6.15.1
CVEListV5suse/suse_linux_enterprise_server_12mailman2.1.17-3.11.1
NVDsuse/mailman< 2.1.15-9.6.15.1+2
CVEListV5opensuse/leap_15.1mailman2.1.29-lp151.2.14

🔴Vulnerability Details

2
GHSA
GHSA-mjp9-97x3-23vj: A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 152022-05-24
CVEList
Local privilege escalation from user wwwrun to root in the packaging of mailman2020-01-24