The log4sh_readProperties function in log4sh 1.2.5 and earlier allows local users to overwrite arbitrary files via a symlink attack on predictable log4sh.$$ filenames.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2005-q3/0001.html - | |
References | () http://bugs.gentoo.org/show_bug.cgi?id=94069 - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2005-July/034873.html - | |
References | () http://secunia.com/advisories/15899 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/14140 - Patch | |
References | () http://www.vupen.com/english/advisories/2005/0957 - | |
References | () http://www.zataz.net/adviso/log4sh-06092005.txt - Vendor Advisory |
Information
Published : 2005-09-02 17:03
Updated : 2025-04-03 01:03
NVD link : CVE-2005-1915
Mitre link : CVE-2005-1915
CVE.ORG link : CVE-2005-1915
JSON object : View
Products Affected
log4sh
- log4sh
CWE