diff --git a/crates/pleaser/RUSTSEC-0000-0000.md b/crates/pleaser/RUSTSEC-0000-0000.md new file mode 100644 index 0000000..cc768bf --- /dev/null +++ b/crates/pleaser/RUSTSEC-0000-0000.md @@ -0,0 +1,16 @@ +```toml +[advisory] +id = "RUSTSEC-0000-0000" +package = "pleaser" +date = "2021-05-27" +url = "https://nvd.nist.gov/vuln/detail/CVE-2021-31154" +categories = ["privilege-escalation"] +cvss = "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" +aliases = ["CVE-2021-31154"] +[versions] +patched = [">= 0.4"] +``` + +# Permissions bypass in pleaser + +pleaseedit in pleaser before 0.4 uses predictable temporary filenames in /tmp and the target directory. This allows a local attacker to gain full root privileges by staging a symlink attack.