CVE-2022-31256

CWE-594 documents4 sources
Severity
7.8HIGH
EPSS
0.1%
top 67.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 26

Description

A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 2.5 | Impact: 5.2

Affected Packages2 packages

NVDopensuse/factory< 8.17.1-1.1
CVEListV5suse/opensuse_factorysendmail8.17.1-1.1

🔴Vulnerability Details

2
GHSA
GHSA-cfgc-fgg8-p3qf: A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory2022-10-26
CVEList
sendmail: mail to root privilege escalation via sm-client.pre script2022-10-26

📋Vendor Advisories

1
Debian
CVE-2022-31256: sendmail - A Improper Link Resolution Before File Access ('Link Following') vulnerability i...2022
CVE-2022-31256 (HIGH CVSS 7.8) | A Improper Link Resolution Before F | cvebase.io