CVE Vulnerabilities

CVE-2010-3691

Improper Link Resolution Before File Access ('Link Following')

Published: Oct 07, 2010 | Modified: Dec 30, 2019
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
3.3 LOW
AV:L/AC:M/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

PGTStorage/pgt-file.php in phpCAS before 1.1.3, when proxy mode is enabled, allows local users to overwrite arbitrary files via a symlink attack on an unspecified file.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Phpcas Apereo * 1.1.2 (including)
Phpcas Apereo 0.2 (including) 0.2 (including)
Phpcas Apereo 0.3 (including) 0.3 (including)
Phpcas Apereo 0.3.1 (including) 0.3.1 (including)
Phpcas Apereo 0.3.2 (including) 0.3.2 (including)
Phpcas Apereo 0.4 (including) 0.4 (including)
Phpcas Apereo 0.4.1 (including) 0.4.1 (including)
Phpcas Apereo 0.4.8 (including) 0.4.8 (including)
Phpcas Apereo 0.4.9 (including) 0.4.9 (including)
Phpcas Apereo 0.4.10 (including) 0.4.10 (including)
Phpcas Apereo 0.4.11 (including) 0.4.11 (including)
Phpcas Apereo 0.4.12 (including) 0.4.12 (including)
Phpcas Apereo 0.4.13 (including) 0.4.13 (including)
Phpcas Apereo 0.4.14 (including) 0.4.14 (including)
Phpcas Apereo 0.4.15 (including) 0.4.15 (including)
Phpcas Apereo 0.4.16 (including) 0.4.16 (including)
Phpcas Apereo 0.4.17 (including) 0.4.17 (including)
Phpcas Apereo 0.4.18 (including) 0.4.18 (including)
Phpcas Apereo 0.4.19 (including) 0.4.19 (including)
Phpcas Apereo 0.4.20 (including) 0.4.20 (including)
Phpcas Apereo 0.4.21 (including) 0.4.21 (including)
Phpcas Apereo 0.4.22 (including) 0.4.22 (including)
Phpcas Apereo 0.4.23 (including) 0.4.23 (including)
Phpcas Apereo 0.5.0 (including) 0.5.0 (including)
Phpcas Apereo 0.5.1 (including) 0.5.1 (including)
Phpcas Apereo 0.6.0 (including) 0.6.0 (including)
Phpcas Apereo 1.0.0 (including) 1.0.0 (including)
Phpcas Apereo 1.0.1 (including) 1.0.1 (including)
Phpcas Apereo 1.1.0 (including) 1.1.0 (including)
Phpcas Apereo 1.1.1 (including) 1.1.1 (including)
Glpi Ubuntu hardy *
Glpi Ubuntu jaunty *
Glpi Ubuntu karmic *
Glpi Ubuntu lucid *
Glpi Ubuntu maverick *
Glpi Ubuntu natty *
Glpi Ubuntu oneiric *
Glpi Ubuntu quantal *
Glpi Ubuntu raring *
Glpi Ubuntu saucy *
Glpi Ubuntu upstream *
Glpi Ubuntu utopic *
Glpi Ubuntu vivid *
Glpi Ubuntu wily *
Moodle Ubuntu dapper *
Moodle Ubuntu hardy *
Moodle Ubuntu jaunty *
Moodle Ubuntu karmic *
Moodle Ubuntu lucid *
Moodle Ubuntu maverick *
Moodle Ubuntu natty *
Moodle Ubuntu oneiric *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References