Link following in Fail2ban - CVE-2009-5023
Published: June 10, 2014 / Updated: August 10, 2020
Fail2ban
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban before 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/fail2ban-mail.txt.