Vulnerability Details : CVE-2013-0164
The lockwrap function in port-proxy/bin/openshift-port-proxy-cfg in Red Hat OpenShift Origin before 1.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.
Exploit prediction scoring system (EPSS) score for CVE-2013-0164
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0164
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:P |
3.9
|
4.9
|
NIST |
CWE ids for CVE-2013-0164
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0164
-
https://github.com/openshift/origin-server/commit/524465f70a32d0eb6bf047e6a05c76c22d52bfa2
Cleanup · openshift/origin-server@524465f · GitHub
-
https://github.com/openshift/origin-server/pull/1136
Cleanup by rmillner · Pull Request #1136 · openshift/origin-server · GitHub
-
http://rhn.redhat.com/errata/RHSA-2013-0220.html
RHSA-2013:0220 - Security Advisory - Red Hat Customer Portal
-
https://bugzilla.redhat.com/show_bug.cgi?id=893307
893307 – (CVE-2013-0164) CVE-2013-0164 openshift-origin-port-proxy: openshift-port-proxy-cfg lockwrap() tmp file creation
Products affected by CVE-2013-0164
- cpe:2.3:a:redhat:openshift:*:-:enterprise:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_origin:1.0.5:*:*:*:*:*:*:*