CVE Vulnerabilities

CVE-2017-15097

Improper Link Resolution Before File Access ('Link Following')

Published: Jul 27, 2018 | Modified: Nov 21, 2024
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linux_desktopRedhat7.0 (including)7.0 (including)
Enterprise_linux_serverRedhat7.0 (including)7.0 (including)
Enterprise_linux_server_ausRedhat7.4 (including)7.4 (including)
Enterprise_linux_server_eusRedhat7.4 (including)7.4 (including)
Enterprise_linux_server_eusRedhat7.5 (including)7.5 (including)
Enterprise_linux_workstationRedhat7.0 (including)7.0 (including)
Red Hat Enterprise Linux 7RedHatpostgresql-0:9.2.23-3.el7_4*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-postgresql94-postgresql-0:9.4.14-2.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-postgresql95-postgresql-0:9.5.9-4.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-postgresql96-postgresql-0:9.6.5-2.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-postgresql94-postgresql-0:9.4.14-2.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-postgresql95-postgresql-0:9.5.9-4.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-postgresql96-postgresql-0:9.6.5-2.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-postgresql94-postgresql-0:9.4.14-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-postgresql95-postgresql-0:9.5.9-4.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-postgresql96-postgresql-0:9.6.5-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-postgresql94-postgresql-0:9.4.14-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-postgresql95-postgresql-0:9.5.9-4.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-postgresql96-postgresql-0:9.6.5-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-postgresql94-postgresql-0:9.4.14-2.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-postgresql95-postgresql-0:9.5.9-4.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-postgresql96-postgresql-0:9.6.5-2.el7*
Red Hat Virtualization Engine 4.2RedHatrh-postgresql95-postgresql-0:9.5.9-4.el7*
Red Hat Virtualization Engine 4.3RedHatrh-postgresql95-postgresql-0:9.5.9-4.el7*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References