4.7

CVE-2009-5023

The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.
Data is provided by the National Vulnerability Database (NVD)
Fail2banFail2ban Version <= 0.8.4
Fail2banFail2ban Version0.1.0
Fail2banFail2ban Version0.1.1
Fail2banFail2ban Version0.1.2
Fail2banFail2ban Version0.3.0
Fail2banFail2ban Version0.3.1
Fail2banFail2ban Version0.4.0
Fail2banFail2ban Version0.4.1
Fail2banFail2ban Version0.5.0
Fail2banFail2ban Version0.5.1
Fail2banFail2ban Version0.5.2
Fail2banFail2ban Version0.5.3
Fail2banFail2ban Version0.5.4
Fail2banFail2ban Version0.5.5
Fail2banFail2ban Version0.6.0
Fail2banFail2ban Version0.6.1
Fail2banFail2ban Version0.7.0
Fail2banFail2ban Version0.7.1
Fail2banFail2ban Version0.7.2
Fail2banFail2ban Version0.7.3
Fail2banFail2ban Version0.7.4
Fail2banFail2ban Version0.7.5
Fail2banFail2ban Version0.7.6
Fail2banFail2ban Version0.7.7
Fail2banFail2ban Version0.7.8
Fail2banFail2ban Version0.7.9
Fail2banFail2ban Version0.8.0
Fail2banFail2ban Version0.8.1
Fail2banFail2ban Version0.8.2
Fail2banFail2ban Version0.8.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.117
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.7 3.4 6.9
AV:L/AC:M/Au:N/C:N/I:C/A:N
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.