pam_oath.so in oath-toolkit 2.6.7 through 2.6.11 before 2.6.12 allows root privilege escalation because, in the context of PAM code running as root, it mishandles usersfile access, such as by calling fchown in the presence of a symlink.
References
Configurations
No configuration.
History
21 Nov 2024, 09:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Oct 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CWE | CWE-22 | |
Summary |
|
09 Oct 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 05:15
Updated : 2024-11-21 09:39
NVD link : CVE-2024-47191
Mitre link : CVE-2024-47191
CVE.ORG link : CVE-2024-47191
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')