Rapid7 Vulnerability & Exploit Database

Amazon Linux AMI: CVE-2018-10897: Security patch for yum-utils (ALAS-2018-1057)

Back to Search

Amazon Linux AMI: CVE-2018-10897: Security patch for yum-utils (ALAS-2018-1057)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
07/30/2018
Created
03/19/2019
Added
08/11/2018
Modified
05/07/2019

Description

A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.

Solution(s)

  • amazon-linux-upgrade-yum-utils

References

  • amazon-linux-upgrade-yum-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;