Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) — Vulnerability Class 426

426 vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)). AI Chinese analysis included.

CWE-59 represents a critical input validation weakness where software fails to properly resolve symbolic links or shortcuts before accessing a file. Attackers typically exploit this vulnerability by crafting malicious links that point to sensitive system files or directories outside the intended scope. When the application resolves these links without adequate checks, it inadvertently grants access to unauthorized resources, potentially leading to data leakage, privilege escalation, or remote code execution. To mitigate this risk, developers must implement rigorous link resolution controls, ensuring that all file paths are canonicalized and verified against a strict allowlist before any I/O operations occur. Utilizing secure API functions that explicitly handle link following, combined with strict permission checks on the final resolved path, effectively prevents attackers from leveraging symlinks to bypass security boundaries and access unintended system components.

MITRE CWE Description
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Common Consequences (2)
Confidentiality, Integrity, Access ControlRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
An attacker may be able to traverse the file system to unintended locations and read or overwrite the contents of unexpected files. If the files are used for a security mechanism then an attacker may be able to bypass the mechanism.
OtherExecute Unauthorized Code or Commands
Windows simple shortcuts, sometimes referred to as soft links, can be exploited remotely since a ".LNK" file can be uploaded like a normal file. This can enable remote execution.
Mitigations (1)
Architecture and DesignFollow the principle of least privilege when assigning access rights to entities in a software system. Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.
CVE IDTitleCVSSSeverityPublished
CVE-2023-21678 Windows Print Spooler Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.8 High2023-01-10
CVE-2023-21542 Windows Installer Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.0 High2023-01-10
CVE-2022-4563 Freedom of the Press SecureDrop gpg-agent.conf symlink — SecureDrop 7.8 High2022-12-16
CVE-2022-4122 Bulidah 后置链接漏洞 — podman 5.3 -2022-12-08
CVE-2022-31256 sendmail: mail to root privilege escalation via sm-client.pre script — openSUSE Factory 7.7 High2022-10-26
CVE-2022-38699 ASUS Armoury Crate Service - Arbitrary File Creation via Elevation of Privilege Flaw — Armoury Crate Service 5.9 Medium2022-09-28
CVE-2022-0029 Cortex XDR Agent: Improper Link Resolution Vulnerability When Generating a Tech Support File — Cortex XDR Agent 5.5 Medium2022-09-14
CVE-2022-2898 Measuresoft ScadaPro Server and Client Link Following — ScadaPro Server and Client 6.1 Medium2022-08-31
CVE-2022-2897 Measuresoft ScadaPro Server and Client Link Following — ScadaPro Server and Client 7.8 High2022-08-31
CVE-2021-35939 rpm 后置链接漏洞 — RPM 6.7 -2022-08-26
CVE-2021-35937 rpm 安全漏洞 — RPM 6.4 -2022-08-25
CVE-2021-35938 rpm 后置链接漏洞 — RPM 6.7 -2022-08-25
CVE-2021-23177 libarchive 后置链接漏洞 — libarchive 7.8 -2022-08-23
CVE-2021-31566 libarchive 后置链接漏洞 — libarchive 7.8 -2022-08-23
CVE-2022-31250 keylime %post scriplet allows for privilege escalation from keylime user to root — Tumbleweed 7.1 High2022-07-20
CVE-2022-31219 Drive Composer Link Following Local Privilege Escalation Vulnerability — Drive Composer entry 7.3 High2022-06-15
CVE-2022-31218 Drive Composer Link Following Local Privilege Escalation Vulnerability — Drive Composer entry 7.8 High2022-06-15
CVE-2022-31217 Drive Composer Link Following Local Privilege Escalation Vulnerability — Drive Composer entry 7.8 High2022-06-15
CVE-2022-31216 Drive Composer Link Following Local Privilege Escalation Vulnerability — Drive Composer entry 7.8 High2022-06-15
CVE-2021-44052 Arbitrary file read — QuTScloud 6.5 Medium2022-05-05
CVE-2022-22995 Western Digital My Cloud OS 5 and My Cloud Home Unauthenticated Arbitrary File Write Vulnerability in Netatalk — My Cloud 10.0 Critical2022-03-25
CVE-2022-22262 ASUS Armoury Crate & Aura Creator Installer之ROG Live Service - Improper Link Resolution Before File Access — Armoury Crate & Aura Creator Installer (ROG Live Service) 7.7 High2022-03-01
CVE-2021-44730 snapd could be made to escalate privileges and run programs as administrator — snapd 7.8 High2022-02-17
CVE-2022-0017 GlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalation — GlobalProtect App 7.0 High2022-02-10
CVE-2022-21944 watchman: chown in watchman@.socket unit allows symlink attack — openSUSE Backports SLE-15-SP3 7.8 High2022-01-26
CVE-2022-0012 Cortex XDR Agent: Local Arbitrary File Deletion Vulnerability — Cortex XDR Agent 6.1 Medium2022-01-12
CVE-2021-3641 Improper Link Resolution Before File Access in Bitdefender GravityZone (VA-9921) — GravityZone 6.1 Medium2021-11-09
CVE-2021-31843 Improper access control vulnerability in McAfee ENS for Windows — McAfee Endpoint Security (ENS) for WIndows 7.3 High2021-09-17
CVE-2021-32557 apport process_report() arbitrary file write — apport 5.2 Medium2021-06-12
CVE-2021-32555 apport read_file() function could follow maliciously constructed symbolic links — apport 7.3 High2021-06-12

Vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) represent 426 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.