CVE-2022-3560Path Traversal in Project Pesign

CWE-22Path Traversal7 documents7 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 87.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 2
Latest updateFeb 14

Description

A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianpesign_project/pesign< 116-1+1
CVEListV5pesign_project/pesignAll versions up to pesign-115

Also affects: Fedora 36, 37, Enterprise Linux 7.0, 8.0, 9.0

🔴Vulnerability Details

3
OSV
CVE-2022-3560: A flaw was found in pesign2023-02-02
GHSA
GHSA-w2gm-3gx9-m2p2: A flaw was found in pesign2023-02-02
CVEList
CVE-2022-3560: A flaw was found in pesign2023-02-02

📋Vendor Advisories

3
Microsoft
A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories t2023-02-14
Red Hat
pesign: Local privilege escalation on pesign systemd service2023-01-31
Debian
CVE-2022-3560: pesign - A flaw was found in pesign. The pesign package provides a systemd service used t...2022
CVE-2022-3560 — Path Traversal in Pesign Project Pesign | cvebase