CVE-2022-1537Time-of-check Time-of-use (TOCTOU) Race Condition in Grunt

Severity
7.0HIGHNVD
EPSS
0.2%
top 52.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 10
Latest updateFeb 7

Description

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages4 packages

NVDgruntjs/grunt< 1.5.3
npmgruntjs/grunt< 1.5.3
CVEListV5gruntjs/gruntjs_gruntunspecified1.5.3
Debiangruntjs/grunt< 1.3.0-1+deb11u2+3

Patches

🔴Vulnerability Details

5
OSV
grunt vulnerabilities2023-02-07
GHSA
Race Condition in Grunt2022-05-11
OSV
Race Condition in Grunt2022-05-11
OSV
CVE-2022-1537: file2022-05-10
CVEList
file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in gruntjs/grunt2022-05-10

📋Vendor Advisories

3
Ubuntu
Grunt vulnerabilities2023-02-07
Red Hat
gruntjs: race condition leading to arbitrary file write2022-05-10
Debian
CVE-2022-1537: grunt - file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leadin...2022
CVE-2022-1537 — Gruntjs Grunt vulnerability | cvebase