cve/2018/CVE-2018-10897.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-10897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10897)
![](https://img.shields.io/static/v1?label=Product&message=yum-utils%3A&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.1.31%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-59&color=brighgreen)
### Description
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.
### POC
#### Reference
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
2024-06-09 00:33:16 +00:00
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.