Vulnerability Description
On MacOS and Linux, it may be possible to perform a symlink attack by replacing this predictable file name with a symlink to another file and have the Velociraptor client overwrite the other file. This issue was resolved in Velociraptor 0.6.5-2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapid7 | Velociraptor | < 0.6.5-2 |
| Apple | Macos | - |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://www.rapid7.com/blog/post/2022/07/26/cve-2022-35629-35632-velociraptor-muMitigationPatchVendor Advisory
- https://www.rapid7.com/blog/post/2022/07/26/cve-2022-35629-35632-velociraptor-muMitigationPatchVendor Advisory
FAQ
What is CVE-2022-35631?
CVE-2022-35631 is a vulnerability with a CVSS score of 5.5 (MEDIUM). On MacOS and Linux, it may be possible to perform a symlink attack by replacing this predictable file name with a symlink to another file and have the Velociraptor client overwrite the other file. Thi...
How severe is CVE-2022-35631?
CVE-2022-35631 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-35631?
Check the references section above for vendor advisories and patch information. Affected products include: Rapid7 Velociraptor, Apple Macos, Linux Linux Kernel.