![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-1537 |
Description: | file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root. |
Test IDs: | 1.3.6.1.4.1.25623.1.1.1.2.2023.3383 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-1537 https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d https://github.com/gruntjs/grunt/commit/58016ffac5ed9338b63ecc2a63710f5027362bae https://github.com/gruntjs/grunt/commit/58016ffac5ed9338b63ecc2a63710f5027362bae https://lists.debian.org/debian-lts-announce/2023/04/msg00006.html |