Rapid7 Vulnerability & Exploit Database

USN-1543-1: Config-IniFiles vulnerability

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

USN-1543-1: Config-IniFiles vulnerability

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:P)
Published
06/27/2012
Created
07/25/2018
Added
05/06/2013
Modified
07/09/2020

Description

The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.

Solution(s)

  • ubuntu-upgrade-libconfig-inifiles-perl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;