Privilege Escalation via Exim Symlink Attack

Privilege Escalation via Exim Symlink Attack

CVE-2020-28007 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.

Learn more about our User Device Pen Test.