main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
References
Link | Resource |
---|---|
https://github.com/tinyproxy/tinyproxy/issues/106 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html | |
https://github.com/tinyproxy/tinyproxy/issues/106 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html |
Configurations
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tinyproxy/tinyproxy/issues/106 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html - |
Information
Published : 2017-07-30 16:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11747
Mitre link : CVE-2017-11747
CVE.ORG link : CVE-2017-11747
JSON object : View
Products Affected
tinyproxy_project
- tinyproxy
CWE
CWE-269
Improper Privilege Management