3.6
CVSSv2

CVE-2017-15111

Published: 20/01/2018 Updated: 06/08/2019
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 320
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

keycloak-httpd-client-install versions prior to 0.8 insecurely creates temporary file allowing local malicious users to overwrite other files via symbolic link.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

keycloak-httpd-client-install project keycloak-httpd-client-install

Vendor Advisories

Synopsis Low: keycloak-httpd-client-install security, bug fix, and enhancement update Type/Severity Security Advisory: Low Topic An update for keycloak-httpd-client-install is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Co ...
It was discovered that keycloak-httpd-client-install uses a predictable log file name in /tmp A local attacker could create a symbolic link to a sensitive location, possibly causing data corruption or denial of service(CVE-2017-15111) In keycloak-http-client-install prior to version 08, the admin password could be provided through a command-line ...
It was discovered that keycloak-httpd-client-install uses a predictable log file name in /tmp A local attacker could create a symbolic link to a sensitive location, possibly causing data corruption or denial of service ...