CVE-2020-12831

An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1830805 Exploit Issue Tracking Vendor Advisory
https://github.com/FRRouting/frr/pull/6383 Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1830805 Exploit Issue Tracking Vendor Advisory
https://github.com/FRRouting/frr/pull/6383 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:free_range_routing:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:00

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1830805 - Exploit, Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1830805 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/FRRouting/frr/pull/6383 - Patch, Third Party Advisory () https://github.com/FRRouting/frr/pull/6383 - Patch, Third Party Advisory

07 Nov 2023, 03:15

Type Values Removed Values Added
Summary ** DISPUTED ** An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file. An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file

Information

Published : 2020-05-13 18:15

Updated : 2024-11-21 05:00


NVD link : CVE-2020-12831

Mitre link : CVE-2020-12831

CVE.ORG link : CVE-2020-12831


JSON object : View

Products Affected

linuxfoundation

  • free_range_routing
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource