CVE Vulnerabilities

CVE-2022-41973

Improper Link Resolution Before File Access ('Link Following')

Published: Oct 29, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
Multipath-toolsOpensvc0.7.7 (including)0.9.2 (excluding)
Red Hat Enterprise Linux 8RedHatdevice-mapper-multipath-0:0.8.4-37.el8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatdevice-mapper-multipath-0:0.8.4-22.el8_6.5*
Red Hat Enterprise Linux 9RedHatdevice-mapper-multipath-0:0.8.7-20.el9*
Multipath-toolsUbuntudevel*
Multipath-toolsUbuntuesm-infra/focal*
Multipath-toolsUbuntufocal*
Multipath-toolsUbuntujammy*
Multipath-toolsUbuntukinetic*
Multipath-toolsUbuntutrusty*
Multipath-toolsUbuntuxenial*

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References