CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.1 | $0-$5k | 0.00 |
A vulnerability classified as problematic has been found in GNU Parallel. Affected is some unknown functionality. The manipulation with an unknown input leads to a link following vulnerability. CWE is classifying the issue as CWE-59. The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
GNU Parallel before 20150422, when using (1) --pipe, (2) --tmux, (3) --cat, (4) --fifo, or (5) --compress, allows local users to write to arbitrary files via a symlink attack on a temporary file.
The weakness was disclosed 06/02/2015 (Website). The advisory is shared for download at lists.gnu.org. This vulnerability is traded as CVE-2015-4155 since 06/02/2015. The attack needs to be approached locally. A authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
Upgrading to version 20150422 eliminates this vulnerability.
The entry 75673 is pretty similar.
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Link followingCWE: CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Parallel 20150422
Timeline
04/22/2015 🔍04/22/2015 🔍
06/02/2015 🔍
06/02/2015 🔍
06/02/2015 🔍
06/03/2015 🔍
11/02/2015 🔍
03/10/2018 🔍
Sources
Vendor: gnu.orgAdvisory: lists.gnu.org
Status: Not defined
CVE: CVE-2015-4155 (🔍)
Vulnerability Center: 54107 - GNU Parallel <20150422 Local File System Write via Symlink Attack, Low
SecurityFocus: 74962 - GNU Parallel CVE-2015-4155 Insecure Temporary File Creation Vulnerability
See also: 🔍
Entry
Created: 06/03/2015 10:46Updated: 03/10/2018 10:46
Changes: 06/03/2015 10:46 (48), 03/10/2018 10:46 (9)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.