Web Application Finger Printer (WAFP) 0.01-26c3 uses fixed pathnames under /tmp for temporary files and directories, which (1) allows local users to cause a denial of service (application outage) by creating a file with a pathname that the product expects is available for its own internal use, (2) allows local users to overwrite arbitrary files via symlink attacks on certain files in /tmp, (3) might allow local users to delete arbitrary files and directories via a symlink attack on a directory under /tmp, and (4) might make it easier for local users to obtain sensitive information by reading files in a directory under /tmp, related to (a) lib/wafp_pidify.rb, (b) utils/generate_wafp_fingerprint.sh, (c) utils/online_update.sh, and (d) utils/extract_from_db.sh.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-10-03T16:21:01
Updated: 2022-10-03T16:21:01
Reserved: 2022-10-03T00:00:00
Link: CVE-2010-1438
JSON object: View
NVD Information
Status : Analyzed
Published: 2010-05-06T14:53:01.390
Modified: 2010-05-11T04:00:00.000
Link: CVE-2010-1438
JSON object: View
Redhat Information
No data.
CWE