Miggo Logo

CVE-2016-10538: Arbitrary File Write in cli

N/A

CVSS Score

Basic Information

EPSS Score
0.5418%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
clinpm< 1.0.01.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The security patch removes all daemon-related functionality including the cli.daemon method that contained the vulnerable temporary file creation logic. The removed code explicitly shows predictable path construction using /tmp + app name pattern. This matches the CVE description of insecure temporary file handling that enables arbitrary file writes via symlink attacks. The function would appear in profiler traces when daemon operations (start(), stop(), log()) were executed in vulnerable versions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `*li` us* pr**i*t**l* t*mpor*ry *il* n*m*s. I* *n *tt**k*r **n *r**t* * sym*oli* link *t t** lo**tion o* on* o* t**s* t*mpor*rly *il* n*m*s, t** *tt**k*r **n *r*itr*rily writ* to *ny *il* t**t t** us*r w*i** owns t** `*li` pro**s

Reasoning

T** s**urity p*t** r*mov*s *ll ***mon-r*l*t** *un*tion*lity in*lu*in* t** `*li.***mon` m*t*o* t**t *ont*in** t** vuln*r**l* t*mpor*ry *il* *r**tion lo*i*. T** r*mov** *o** *xpli*itly s*ows pr**i*t**l* p*t* *onstru*tion usin* `/tmp` + *pp n*m* p*tt*rn