Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ curl: curl file writing susceptible to symlink attacks

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š curl: curl file writing susceptible to symlink attacks


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vulners.com


image
Summary: If curl command is used to download a file with predictable file name to a world writable directory (such as /tmp), a local attacker is able to mount a symlink attack to either A) redirect the target file writing to another file writable by the user or B) replace the downloaded file contents with arbitrary other data. libcurl file:// upload is similarly affected. However, this really isn't a vulnerability in curl or libcurl itself, but use of curl or libcurl. Steps To Reproduce: Scenario A example: attacker does: ln -s /home/victim/.bashrc /tmp/target.sh victim does: curl --output-dir /tmp -O https://example.com/target.sh or curl -o /tmp/target.sh https://example.com/whatever or similar => Instead of downloading the file to /tmp/target.sh it will be written to /home/victim/.bashrc. This attack works the best when the attacker can control which file is downloaded (granted, this is often not possible). Scenario B example: attacker does: install -m 606 /dev/null /tmp/target.sh attacker waits for the file to be closed (inotify), and immediately replaces the file contents with malicious content once closed victim does: curl --output-dir /tmp -O https://example.com/target.sh or curl -o /tmp/target.sh https://example.com/whatever or similar => The victim downloaded content is replaced by malicious content before it's used (copied, executed etc) by the victim. Remediation Documentation should be amended to warn users against this threat. If temporary... ...



๐Ÿ“Œ curl: curl file writing susceptible to symlink attacks


๐Ÿ“ˆ 76.81 Punkte

๐Ÿ“Œ curl: curl overwrites local file with -J option if file non-readable, but file writable.


๐Ÿ“ˆ 30.36 Punkte

๐Ÿ“Œ Brother Printers Susceptible to Remote Denial of Service Attacks


๐Ÿ“ˆ 29.96 Punkte

๐Ÿ“Œ Survey: Countries With Government-Mandated Encryption Backdoors More Susceptible To Nation-State Attacks


๐Ÿ“ˆ 29.96 Punkte

๐Ÿ“Œ 97% of global banks are susceptible to web and mobile attacks


๐Ÿ“ˆ 29.96 Punkte

๐Ÿ“Œ curl: Buffer overflow and affected url:-https://github.com/curl/curl/blob/master/docs/examples/hsts-preload.c


๐Ÿ“ˆ 26.98 Punkte

๐Ÿ“Œ Python Software Foundation CPython up to 3.6.4 on Windows os.symlink() Symlink memory corruption


๐Ÿ“ˆ 24.76 Punkte

๐Ÿ“Œ SuSE Linux Enterprise Debuginfo Symlink symlink [CVE-2020-8019]


๐Ÿ“ˆ 24.76 Punkte

๐Ÿ“Œ openSUSE Leap/Tumbleweed Symlink symlink [CVE-2020-8014]


๐Ÿ“ˆ 24.76 Punkte

๐Ÿ“Œ Python Software Foundation CPython bis 3.6.4 auf Windows os.symlink() Symlink Pufferรผberlauf


๐Ÿ“ˆ 24.76 Punkte

๐Ÿ“Œ Writing Visual Studio Extensions with Mads - Writing JSON Schemas


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ Writing Visual Studio Extensions with Mads - Writing your first extension


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ What is Content Writing? 10 Best Tips for Great Content Writing


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ Writing Cybersecurity Articles โ€“ Setting Up Your Writing Process


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ 5 Content Writing Tools to Improve your Content Writing Skills


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ Can an AI writing assistant match my personal writing style?


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ Comparing the writing speeds of ISO writing tools


๐Ÿ“ˆ 24.72 Punkte

๐Ÿ“Œ All Drupal Versions Susceptible to Code Execution, Credential Theft Vulnerabilities


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ All Drupal Versions Susceptible to Code Execution, Credential Theft Vulnerabilities


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ The Parts of America Most Susceptible To Automation


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Qt5-Based GUI Apps Susceptible to Remote Code Execution


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ AMD isn't susceptible to Intel's security vulnerabilities.


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ AI Training Algorithms Susceptible To Backdoors, Manipulation


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Hotel Rooms Around the World Susceptible to Silent Breach


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Half of Android Handsets Susceptible to Clever SMS Phishing Attack


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ TRRespass - DDR4 is susceptible to a Rowhammer-style attack that it was thought to be immune to.


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Young Adults, Seniors Over 75 Most Susceptible to Cyber Fraud: Report


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Windows devices with newest CPUs are susceptible to data damage


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Windows devices with newest CPUs are susceptible to data damage


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Bitglass Security Spotlight: iPhones Susceptible to a Hack via Text


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Security In 5: Epiosde 647 - Facebook Just As Susceptible to Employee Errors As You


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Node.js third-party modules: Fastify uses allErrors: true ajv configuration by default which is susceptible to DoS


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ Vulnerability in the 5G network make mobile phones susceptible to eavesdropping


๐Ÿ“ˆ 24.41 Punkte

๐Ÿ“Œ curl: curl "globbing" can lead to denial of service attacks


๐Ÿ“ˆ 23.54 Punkte

๐Ÿ“Œ curl: Parallel upload hangs curl if upload file not found


๐Ÿ“ˆ 22.11 Punkte











matomo