opensuse opensuse-factory CVE-2021-32000 in OpenSuse and Suse Products
Published on July 28, 2021

clone-master-clean-up: dangerous file system operations

product logo product logo
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions.

NVD

Vulnerability Analysis

CVE-2021-32000 is exploitable with physical access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
PHYSICAL
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
LOW
Availability Impact:
LOW

Products Associated with CVE-2021-32000

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-32000 are published in these products:

 
 
 

Affected Versions

SUSE Linux Enterprise Server 12 SP3: SUSE Linux Enterprise Server 15 SP1: openSUSE Factory:

Exploit Probability

EPSS
0.02%
Percentile
3.98%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.