zccrs

4 exploits Active since Jul 2019
CVE-2019-13226 WRITEUP HIGH WRITEUP
Deepin-clone < 1.1.3 - Race Condition
deepin-clone before 1.1.3 uses a predictable path /tmp/.deepin-clone/mount/<block-dev-basename> in the Helper::temporaryMountDevice() function to temporarily mount a file system as root. An unprivileged user can prepare a symlink at this location to have the file system mounted in an arbitrary location. By winning a race condition, the attacker can also enter the mount point, thereby preventing a subsequent unmount of the file system.
CVSS 7.0
CVE-2019-13227 WRITEUP MEDIUM WRITEUP
Deepin-clone < 1.1.3 - Symlink Following
In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
CVSS 5.5
CVE-2019-13228 WRITEUP MEDIUM WRITEUP
Deepin-clone < 1.1.3 - Symlink Following
deepin-clone before 1.1.3 uses a fixed path /tmp/repo.iso in the BootDoctor::fix() function to download an ISO file, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. By winning a race condition to replace the /tmp/repo.iso symlink by an attacker controlled ISO file, further privilege escalation may be possible.
CVSS 4.7
CVE-2019-13229 WRITEUP MEDIUM WRITEUP
Deepin Clone < 1.1.3 - Symlink Following
deepin-clone before 1.1.3 uses a fixed path /tmp/partclone.log in the Helper::getPartitionSizeInfo() function to write a log file as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled.
CVSS 5.5