icon

We found results for “

CVE-2024-45339

Good to know:

icon

Date: January 27, 2025

When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.

Severity Score

Severity Score

Weakness Type (CWE)

UNIX Symbolic Link (Symlink) Following

CWE-61

Insecure Temporary File

CWE-377

Top Fix

icon

Upgrade Version

Upgrade to version github.com/golang/glog - v1.2.4

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us