{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-1438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Web Application Finger Printer (WAFP) 0.01-26c3 uses fixed pathnames under /tmp for temporary files and directories, which (1) allows local users to cause a denial of service (application outage) by creating a file with a pathname that the product expects is available for its own internal use, (2) allows local users to overwrite arbitrary files via symlink attacks on certain files in /tmp, (3) might allow local users to delete arbitrary files and directories via a symlink attack on a directory under /tmp, and (4) might make it easier for local users to obtain sensitive information by reading files in a directory under /tmp, related to (a) lib/wafp_pidify.rb, (b) utils/generate_wafp_fingerprint.sh, (c) utils/online_update.sh, and (d) utils/extract_from_db.sh." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/webapplicationfingerprinter/issues/detail?id=8", "refsource": "MISC", "url": "http://code.google.com/p/webapplicationfingerprinter/issues/detail?id=8" }, { "name": "[oss-security] 20100427 Re: wafp insecure temporary directory", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/04/28/3" }, { "name": "39760", "refsource": "BID", "url": "http://www.securityfocus.com/bid/39760" }, { "name": "[oss-security] 20100427 wafp insecure temporary directory", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/04/27/6" } ] } }