CVE-2020-10174Link Following in Project Timeshift

Severity
7.0HIGHNVD
EPSS
0.1%
top 68.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 5
Latest updateMay 24

Description

init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a preexisting temporary directory in the predictable location /tmp/timeshift. It follows symlinks in this location or uses directories owned by unprivileged users. Because Timeshift also executes scripts under this location, an attacker can attempt to win a race condition to replace scripts created by Timeshift with attacker-controlled scripts. Upon success, an attacker-controlled script is executed with full root privi

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages3 packages

debiandebian/timeshift< timeshift 20.03+ds-1 (bookworm)
Debiantimeshift_project/timeshift< 20.03+ds-1+3

Also affects: Fedora 30, 31, 32, Ubuntu Linux 19.10

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mw9g-hwpr-h3rv: init_tmp in TeeJee2022-05-24
OSV
CVE-2020-10174: init_tmp in TeeJee2020-03-05

📋Vendor Advisories

2
Ubuntu
Timeshift vulnerability2020-03-30
Debian
CVE-2020-10174: timeshift - init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a p...2020

💬Community

3
Bugzilla
CVE-2020-10174 timeshift: Arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift [epel-7]2020-03-09
Bugzilla
CVE-2020-10174 timeshift: Arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift2020-03-09
Bugzilla
CVE-2020-10174 timeshift: Arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift [fedora-all]2020-03-09
CVE-2020-10174 — Link Following in Project Timeshift | cvebase