CVE Vulnerabilities

CVE-2022-1537

Time-of-check Time-of-use (TOCTOU) Race Condition

Published: May 10, 2022 | Modified: Apr 05, 2023
CVSS 3.x
7
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.9 MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
7.8 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM

file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS users .bashrc file or replace /etc/shadow file if the GruntJS user is root.

Weakness

The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.

Affected Software

Name Vendor Start Version End Version
Grunt Gruntjs * 1.5.3 (excluding)
Grunt Ubuntu bionic *
Grunt Ubuntu esm-apps/bionic *
Grunt Ubuntu esm-apps/focal *
Grunt Ubuntu esm-apps/jammy *
Grunt Ubuntu focal *
Grunt Ubuntu impish *
Grunt Ubuntu jammy *
Grunt Ubuntu upstream *

Potential Mitigations

References