First published: Thu Jul 04 2019(Updated: )
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Deepin Clone | <1.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13227 is a high severity vulnerability due to the potential for symlink attacks that can lead to unauthorized file creation or overwriting.
To mitigate CVE-2019-13227, upgrade deepin-clone to version 1.1.3 or later, which resolves the symlink vulnerability.
Users of deepin-clone versions prior to 1.1.3 are affected by CVE-2019-13227.
CVE-2019-13227 enables a symlink attack that allows an unprivileged user to create or overwrite files in arbitrary locations.
The impact of CVE-2019-13227 on system security includes potential unauthorized file manipulation and compromise of file integrity.