vendor:
Corel Update Utility
by:
SecurityFocus
7.2
CVSS
HIGH
Local PATH Vulnerability
22
CWE
Product Name: Corel Update Utility
Affected Version From: Corel LinuxOS
Affected Version To: Corel LinuxOS
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2002
Corel Update Utility Local PATH Vulnerability
The binary 'get_it', which is stored in /usr/X11R6/bin, is setuid root installed by default on all Corel LinuxOS systems. get_it relies on PATH to be valid when it calls 'cp' (without the full path), making it possible to spawn an arbitrary program (called 'cp') with inherited root privs by changing the first searched path to one in which a malicious cp lies. This can lead to immediate local root compromise.
Mitigation:
Ensure that the PATH environment variable is set correctly and that it does not include any user-controlled directories.