CVE Vulnerabilities

CVE-2017-15097

Improper Link Resolution Before File Access ('Link Following')

Published: Jul 27, 2018 | Modified: Feb 12, 2023
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Ubuntu

Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Enterprise_linux_desktop Redhat 7.0 (including) 7.0 (including)
Enterprise_linux_server Redhat 7.0 (including) 7.0 (including)
Enterprise_linux_server_aus Redhat 7.4 (including) 7.4 (including)
Enterprise_linux_server_eus Redhat 7.4 (including) 7.4 (including)
Enterprise_linux_server_eus Redhat 7.5 (including) 7.5 (including)
Enterprise_linux_workstation Redhat 7.0 (including) 7.0 (including)
Red Hat Enterprise Linux 7 RedHat postgresql-0:9.2.23-3.el7_4 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-postgresql94-postgresql-0:9.4.14-2.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-postgresql95-postgresql-0:9.5.9-4.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-postgresql96-postgresql-0:9.6.5-2.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-postgresql94-postgresql-0:9.4.14-2.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-postgresql95-postgresql-0:9.5.9-4.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-postgresql96-postgresql-0:9.6.5-2.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-postgresql94-postgresql-0:9.4.14-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-postgresql95-postgresql-0:9.5.9-4.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-postgresql96-postgresql-0:9.6.5-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-postgresql94-postgresql-0:9.4.14-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-postgresql95-postgresql-0:9.5.9-4.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-postgresql96-postgresql-0:9.6.5-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-postgresql94-postgresql-0:9.4.14-2.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-postgresql95-postgresql-0:9.5.9-4.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-postgresql96-postgresql-0:9.6.5-2.el7 *
Red Hat Virtualization Engine 4.2 RedHat rh-postgresql95-postgresql-0:9.5.9-4.el7 *
Red Hat Virtualization Engine 4.3 RedHat rh-postgresql95-postgresql-0:9.5.9-4.el7 *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References