Description
A Time-of-Check to Time-of-Use (TOCTOU) vulnerability in the cp utility of uutils coreutils allows an attacker to bypass no-dereference intent. The utility checks if a source path is a symbolic link using path-based metadata but subsequently opens it without the O_NOFOLLOW flag. An attacker with concurrent write access can swap a regular file for a symbolic link during this window, causing a privileged cp process to copy the contents of arbitrary sensitive files into a destination controlled by the attacker.
Problem types
CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition
CWE-59: Improper Link Resolution Before File Access ('Link Following')
Product status
Credits
Zellic
References
github.com/uutils/coreutils/issues/10017
github.com/uutils/coreutils/issues/10017