CVE-2024-39578

Sept. 3, 2024, 8:56 p.m.

CVSS Score

6.3 / 10

Products Impacted

Vendor Product Versions
dell
  • powerscale_onefs
  • *, 9.8.0.0

Description

Dell PowerScale OneFS versions 8.2.2.x through 9.8.0.1 contains a UNIX symbolic link (symlink) following vulnerability. A local high privileged attacker could potentially exploit this vulnerability, leading to denial of service, information tampering.

Weaknesses

CWE-59
Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

CWE ID: 59
CWE-61
UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.

CWE ID: 61

Date

Published: Aug. 31, 2024, 8:15 a.m.

Last Modified: Sept. 3, 2024, 8:56 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security_alert@emc.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a dell powerscale_onefs / / / / / / / /
a dell powerscale_onefs 9.8.0.0 / / / / / / /

CVSS Data

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
6.3
Exploitability Score
0.8
Impact Score
5.5
Base Severity
MEDIUM
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H

References