Day 50: Symbolic Link Attack, Overwrite Root Files with SUID/Root Invocation

Atumcell Labs
1 min readFeb 18, 2019

--

Systems have to use common code bases or APIs to handle files, do things like open them, write to them, read them and create them. File handling can be attacked in a number of ways.

Symbolic link attack

It is a good idea to check whether a file exists or not before creating it. However, a malicious user might create a file (or worse, a symbolic link to a critical system file) between your check and the moment you actually use the file.

Mitigation

Avoid the race condition by accessing directly the file, and don’t overwrite it if it already exists.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Atumcell Labs
Atumcell Labs

Written by Atumcell Labs

Security Research Team @ Atumcell

No responses yet

Write a response