vendor:
Qpopper
by:
IhaQueR
7.2
CVSS
HIGH
Symlink Follow Vulnerability
N/A
CWE
Product Name: Qpopper
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
Qpopper popauth Symlink Follow Vulnerability
When popauth is executed with the trace option, it does not correctly handle user-supplied input. A user can supply data to the popauth program through the trace flag which will cause the program to execute shell commands, and follow symbolic links. This problem could be exploited to gain privilege elevation equal to that of the setuid bit on popauth, typically setuid as the pop user.
Mitigation:
Update to the latest version of Qpopper.