Name | CVE-2022-1537 |
Description | file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or replace /etc/shadow file if the GruntJS user is root. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3383-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
grunt (PTS) | stretch (security) | 1.0.1-5+deb9u1 | fixed |
| stretch (lts), stretch | 1.0.1-5+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 1.0.1-8+deb10u3 | fixed |
| bullseye | 1.3.0-1+deb11u2 | fixed |
| bookworm | 1.5.3-2 | fixed |
| sid, trixie | 1.6.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
grunt | source | stretch | (not affected) | | | |
grunt | source | buster | 1.0.1-8+deb10u2 | | DLA-3383-1 | |
grunt | source | bullseye | 1.3.0-1+deb11u2 | | | |
grunt | source | (unstable) | 1.5.3-1 | | | |
Notes
https://huntr.dev/bounties/0179c3e5-bc02-4fc9-8491-a1a319b51b4d/
https://github.com/gruntjs/grunt/commit/58016ffac5ed9338b63ecc2a63710f5027362bae (v1.5.3)
[stretch] - grunt <not-affected> (Vulnerable code was added via 433f91b7, which is not present in stretch yet!)