CVE Vulnerabilities

CVE-2024-25952

UNIX Symbolic Link (Symlink) Following

Published: Mar 28, 2024 | Modified: Jan 09, 2025
CVSS 3.x
6
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains an UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering.

Weakness

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.

Affected Software

Name Vendor Start Version End Version
Powerscale_onefs Dell 8.2.2.0 (including) 9.3.0 (including)
Powerscale_onefs Dell 9.4.0 (including) 9.4.0.16 (including)
Powerscale_onefs Dell 9.5.0.0 (including) 9.5.0.8 (excluding)
Powerscale_onefs Dell 9.6.1 (including) 9.7.0.2 (excluding)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References