CVE-2022-35631

On MacOS and Linux, it may be possible to perform a symlink attack by replacing this predictable file name with a symlink to another file and have the Velociraptor client overwrite the other file. This issue was resolved in Velociraptor 0.6.5-2.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rapid7:velociraptor:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:11

Type Values Removed Values Added
References () https://www.rapid7.com/blog/post/2022/07/26/cve-2022-35629-35632-velociraptor-multiple-vulnerabilities-fixed/ - Mitigation, Patch, Vendor Advisory () https://www.rapid7.com/blog/post/2022/07/26/cve-2022-35629-35632-velociraptor-multiple-vulnerabilities-fixed/ - Mitigation, Patch, Vendor Advisory

Information

Published : 2022-07-29 17:15

Updated : 2024-11-21 07:11


NVD link : CVE-2022-35631

Mitre link : CVE-2022-35631

CVE.ORG link : CVE-2022-35631


JSON object : View

Products Affected

rapid7

  • velociraptor

linux

  • linux_kernel

apple

  • macos
CWE
CWE-377

Insecure Temporary File

CWE-59

Improper Link Resolution Before File Access ('Link Following')