Multiple vulnerabilities in Eternal Terminal



| Updated: 2024-05-01
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2022-48258
CVE-2023-23558
CVE-2022-48257
CWE-ID CWE-276
CWE-377
Exploitation vector Local
Public exploit N/A
Vulnerable software
Eternal Terminal
Other software / Other software solutions

Vendor MisterTea

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Incorrect default permissions

EUVDB-ID: #VU89095

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48258

CWE-ID: CWE-276 - Incorrect Default Permissions

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to incorrect default permissions for logfiles set by the application. A local user with access to the system can view contents of files and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Eternal Terminal: 1.1.1 - 6.2.1

CPE2.3 External links

https://github.com/MisterTea/EternalTerminal/issues/555
https://github.com/MisterTea/EternalTerminal/pull/556
https://www.openwall.com/lists/oss-security/2023/02/16/1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Insecure Temporary File

EUVDB-ID: #VU89094

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-23558

CWE-ID: CWE-377 - Insecure Temporary File

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insecure temporary file handling. A local user can create the "/tmp/.sentry-native-etserver" file with world-writable permissions and gain access to sensitive information stored in it by the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Eternal Terminal: 1.1.1 - 6.2.1

CPE2.3 External links

https://bugzilla.suse.com/show_bug.cgi?id=1207126
https://github.com/MisterTea/EternalTerminal
https://www.openwall.com/lists/oss-security/2023/02/16/1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Insecure temporary file

EUVDB-ID: #VU89088

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-48257

CWE-ID: CWE-377 - Insecure Temporary File

Exploit availability: No

Description

The vulnerability allows a local user to disable application log.

The vulnerability exists due to etserver and etclient use predictable logfile names in /tmp. A local user can create a log file before the applications and disable logging.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Eternal Terminal: 1.1.1 - 6.2.1

CPE2.3 External links

https://github.com/MisterTea/EternalTerminal/issues/555
https://github.com/MisterTea/EternalTerminal/pull/556
https://www.openwall.com/lists/oss-security/2023/02/16/1


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###