Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Akamai Guardicore Platform Agent (GPA) and Zero Trust Client on Linux and macOS allow TOCTOU-based local privilege escalation. The GPA service creates an IPC socket in the world-writable /tmp directory. It accepts unauthenticated IPC control messages. This enables a TOCTOU vulnerability in the HandleSaveLogs() function of the GPA service, by creating a log file and manipulating it into a symlink that points to the targeted path; this can allow an unprivileged local user to make arbitrary root-owned files world-writable. In addition, a diagnostic collection tool (gimmelogs) running with root privileges was vulnerable to command injection from the dbstore, offering a second privilege escalation vector. (On Windows, gimmelogs does not have command injection but does allow writing a ZIP archive to an unintended location.) This affects Akamai Guardicore Platform Agent 7.0 through 7.3.1 and Akamai Zero Trust Client 6.0 through 6.1.5.
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
检查时间与使用时间(TOCTOU)的竞争条件
Vulnerability Title
Akamai Guardicore Platform Agent 安全漏洞
Vulnerability Description
Akamai Guardicore Platform Agent是美国Akamai公司的一个安全代理。 Akamai Guardicore Platform Agent 7.0版本至7.3.1版本和Akamai Zero Trust Client 6.0版本至6.1.5版本存在安全漏洞,该漏洞源于基于TOCTOU的本地权限提升,通过创建日志文件并操纵为指向目标路径的符号链接,可能导致未授权本地用户使任意root拥有的文件可被全局写入,同时诊断收集工具存在命令注入,提供第二个权限提升向量。
CVSS Information
N/A
Vulnerability Type
N/A