CVE Vulnerabilities

CVE-2020-36314

Improper Link Resolution Before File Access ('Link Following')

Published: Apr 07, 2021 | Modified: Nov 07, 2023
CVSS 3.x
3.9
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
CVSS 2.x
2.6 LOW
AV:L/AC:H/Au:N/C:N/I:P/A:P
RedHat/V2
RedHat/V3
3.9 LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM

fr-archive-libarchive.c in GNOME file-roller through 3.38.0, as used by GNOME Shell and other software, allows Directory Traversal during extraction because it lacks a check of whether a files parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-11736.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
File-roller Gnome * 3.38.0 (including)
Red Hat Enterprise Linux 8 RedHat file-roller-0:3.28.1-4.el8 *
File-roller Ubuntu bionic *
File-roller Ubuntu devel *
File-roller Ubuntu focal *
File-roller Ubuntu groovy *
File-roller Ubuntu hirsute *
File-roller Ubuntu trusty *
File-roller Ubuntu xenial *

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References