CVE-2020-12831Incorrect Permission Assignment in Free Range Routing

Severity
5.3MEDIUMNVD
EPSS
0.3%
top 48.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 24

Description

An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-x83m-q23q-xv5j: ** DISPUTED ** An issue was discovered in FRRouting FRR (aka Free Range Routing) through 72022-05-24
OSV
CVE-2020-12831: An issue was discovered in FRRouting FRR (aka Free Range Routing) through 72020-05-13

📋Vendor Advisories

2
Red Hat
frr: default permission issue eases information leaks2020-05-03
Debian
CVE-2020-12831: frr - An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1....2020

💬Community

2
Bugzilla
CVE-2020-12831 frr: default permission issue eases information leaks [fedora-all]2020-06-19
Bugzilla
CVE-2020-12831 frr: default permission issue eases information leaks2020-05-03