In Netflix OSS Hollow, since the Files.exists(parent) is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
References
Link | Resource |
---|---|
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md | Third Party Advisory |
https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md - Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-330 |
Information
Published : 2021-03-23 21:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28099
Mitre link : CVE-2021-28099
CVE.ORG link : CVE-2021-28099
JSON object : View
Products Affected
netflix
- hollow
CWE
CWE-330
Use of Insufficiently Random Values