Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) — Vulnerability Class 426

426 vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)). AI Chinese analysis included.

CWE-59 represents a critical input validation weakness where software fails to properly resolve symbolic links or shortcuts before accessing a file. Attackers typically exploit this vulnerability by crafting malicious links that point to sensitive system files or directories outside the intended scope. When the application resolves these links without adequate checks, it inadvertently grants access to unauthorized resources, potentially leading to data leakage, privilege escalation, or remote code execution. To mitigate this risk, developers must implement rigorous link resolution controls, ensuring that all file paths are canonicalized and verified against a strict allowlist before any I/O operations occur. Utilizing secure API functions that explicitly handle link following, combined with strict permission checks on the final resolved path, effectively prevents attackers from leveraging symlinks to bypass security boundaries and access unintended system components.

MITRE CWE Description
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Common Consequences (2)
Confidentiality, Integrity, Access ControlRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
An attacker may be able to traverse the file system to unintended locations and read or overwrite the contents of unexpected files. If the files are used for a security mechanism then an attacker may be able to bypass the mechanism.
OtherExecute Unauthorized Code or Commands
Windows simple shortcuts, sometimes referred to as soft links, can be exploited remotely since a ".LNK" file can be uploaded like a normal file. This can enable remote execution.
Mitigations (1)
Architecture and DesignFollow the principle of least privilege when assigning access rights to entities in a software system. Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.
CVE IDTitleCVSSSeverityPublished
CVE-2024-8404 Arbitrary File Deletion in PaperCut NG/MF Web Print Hot folder — PaperCut NG, PaperCut MF 7.8 High2024-09-26
CVE-2024-45770 Pcp: pmpost symlink attack allows escalating pcp to root user 4.4 Medium2024-09-19
CVE-2024-43470 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability — Azure Network Watcher VM Extension 7.3 High2024-09-10
CVE-2024-38188 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability — Azure Network Watcher VM Extension 7.1 High2024-09-10
CVE-2023-43078 Dell Client Platform和Dell Dock Firmware 后置链接漏洞 — Dell Client Platform, Dell Dock Firmware 6.7 Medium2024-08-28
CVE-2024-5928 VIPRE Advanced Security PMAgent Link Following Local Privilege Escalation Vulnerability — Advanced Security 7.8AIHighAI2024-08-21
CVE-2024-38098 Azure Connected Machine Agent Elevation of Privilege Vulnerability — Azure Connected Machine Agent 7.8 High2024-08-13
CVE-2024-38084 Microsoft OfficePlus Elevation of Privilege Vulnerability — Microsoft OfficePLUS 7.8 High2024-08-13
CVE-2024-7252 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability — Internet Security Pro 7.8AIHighAI2024-07-29
CVE-2024-7251 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability — Internet Security Pro 7.8AIHighAI2024-07-29
CVE-2024-7250 Comodo Internet Security Pro cmdagent Link Following Local Privilege Escalation Vulnerability — Internet Security Pro 7.8AIHighAI2024-07-29
CVE-2024-7249 Comodo Firewall Link Following Local Privilege Escalation Vulnerability — Firewall 7.8AIHighAI2024-07-29
CVE-2024-38081 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability — Microsoft Visual Studio 2022 version 17.4 7.3 High2024-07-09
CVE-2024-35261 Azure Network Watcher VM Extension Elevation of Privilege Vulnerability — Azure Network Watcher VM Extension 7.8 High2024-07-09
CVE-2024-38022 Windows Image Acquisition Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.0 High2024-07-09
CVE-2024-38013 Microsoft Windows Server Backup Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.7 Medium2024-07-09
CVE-2024-6147 Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability — Plantronics Hub 7.8AIHighAI2024-06-20
CVE-2024-5742 Nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file 6.7 Medium2024-06-12
CVE-2024-35254 Azure Monitor Agent Elevation of Privilege Vulnerability — Azure Monitor 7.1 High2024-06-11
CVE-2024-35253 Microsoft Azure File Sync Elevation of Privilege Vulnerability — Azure File Sync 4.4 Medium2024-06-11
CVE-2024-30104 Microsoft Office Remote Code Execution Vulnerability — Microsoft Office 2019 7.8 High2024-06-11
CVE-2024-30093 Windows Storage Elevation of Privilege Vulnerability — Windows 10 Version 1809 7.3 High2024-06-11
CVE-2024-30065 Windows Themes Denial of Service Vulnerability — Windows 10 Version 1809 5.5 Medium2024-06-11
CVE-2024-30076 Windows Container Manager Service Elevation of Privilege Vulnerability — Windows 10 Version 1809 6.8 Medium2024-06-11
CVE-2024-35235 Cupsd Listen arbitrary chmod 0140777 — cups 4.4 Medium2024-06-11
CVE-2024-3829 Arbitrary File Read and Write during Snapshot Recovery in qdrant/qdrant — qdrant/qdrant 9.8AICriticalAI2024-06-03
CVE-2023-51636 Avira Prime Link Following Local Privilege Escalation Vulnerability — Prime 7.8AIHighAI2024-05-22
CVE-2024-4454 WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability — Elements 6.5AIMediumAI2024-05-22
CVE-2024-30060 Azure Monitor Agent Elevation of Privilege Vulnerability — Azure Monitor 7.8 High2024-05-16
CVE-2024-30033 Windows Search Service Elevation of Privilege Vulnerability — Windows Server 2022 7.0 High2024-05-14

Vulnerabilities classified as CWE-59 (在文件访问前对链接解析不恰当(链接跟随)) represent 426 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.