main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command.
References
| Link | Resource |
|---|---|
| https://github.com/tinyproxy/tinyproxy/issues/106 | Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html | |
| https://github.com/tinyproxy/tinyproxy/issues/106 | Issue Tracking Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html |
Configurations
History
21 Nov 2024, 03:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/tinyproxy/tinyproxy/issues/106 - Issue Tracking, Patch, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html - |
Information
Published : 2017-07-30 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11747
Mitre link : CVE-2017-11747
CVE.ORG link : CVE-2017-11747
JSON object : View
Products Affected
tinyproxy_project
- tinyproxy
CWE
CWE-269
Improper Privilege Management
