First published: Thu May 20 2021(Updated: )
A UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory allows local attackers to escalate from users postorius or postorius-admin to root. This issue affects: openSUSE Leap 15.2 python-postorius version 1.3.2-lp152.1.2 and prior versions. openSUSE Factory python-postorius version 1.3.4-2.1 and prior versions.
Credit: meissner@suse.de
Affected Software | Affected Version | How to fix |
---|---|---|
Opensuse Python-postorius | <1.3.2-lp152.1.2 | |
openSUSE Leap | =15.2 | |
Opensuse Python-postorius | <=1.3.4-2.1 | |
openSUSE Factory |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31997 is a UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory that allows local attackers to escalate privileges.
CVE-2021-31997 affects openSUSE Leap 15.2 with python-postorius version 1.3.2-lp152.1.2 and prior versions.
An attacker can exploit CVE-2021-31997 by leveraging a UNIX symbolic link following vulnerability in python-postorius to escalate privileges from postorius or postorius-admin users to root.
CVE-2021-31997 has a severity score of 7.8 (High).
To fix CVE-2021-31997, it is recommended to update python-postorius to version 1.3.4-2.1 or later.