First published: Thu Nov 21 2019(Updated: )
Shibboleth Service Provider (SP) 3.x before 3.1.0 shipped a spec file that calls chown on files in a directory controlled by the service user (the shibd account) after installation. This allows the user to escalate to root by pointing symlinks to files such as /etc/shadow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Shibboleth Service Provider | >=3.0.0<3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19191 is a vulnerability in the Shibboleth Service Provider (SP) 3.x before 3.1.0 that allows the user to escalate privileges to root.
CVE-2019-19191 occurs because the spec file in Shibboleth Service Provider (SP) 3.x before 3.1.0 calls chown on files in a directory controlled by the service user, allowing the user to create symlinks and escalate privileges.
CVE-2019-19191 has a severity rating of high with a CVSS score of 7.8.
To fix CVE-2019-19191, it is recommended to upgrade to Shibboleth Service Provider (SP) version 3.1.0 or later.
More information about CVE-2019-19191 can be found in the following references: - [OpenSUSE Security Announcement](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00017.html) - [SUSE Bugzilla](https://bugzilla.suse.com/show_bug.cgi?id=1157471) - [Shibboleth Issue Tracker](https://issues.shibboleth.net/jira/browse/SSPCPP-874)