Link following in G DATA Internet Security - #VU48782
Published: December 4, 2020
G DATA Internet Security
G DATA CyberDefense AG
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to the application follows symbolic links when restoring files. A local user can create a specially crafted file that points to a critical file on the system and abuse the file restore mechanism to overwrite arbitrary files on the system.
Successful exploitation of the vulnerability may allow privilege escalation.