CVE-2024-45339 – Apache Glog Symbolic Link File Overwrite Vulnerability

The following table lists the changes that have been made to the
CVE-2024-45339 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jan. 28, 2025

    Action Type Old Value New Value
    Added Description When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process’s log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.
    Added Reference https://github.com/golang/glog/pull/74
    Added Reference https://github.com/golang/glog/pull/74/commits/b8741656e406e66d6992bc2c9575e460ecaa0ec2
    Added Reference https://groups.google.com/g/golang-announce/c/H-Q4ouHWyKs
    Added Reference https://owasp.org/www-community/vulnerabilities/Insecure_Temporary_File
    Added Reference https://pkg.go.dev/vuln/GO-2025-3372
Share the Post:

Related Posts