CVE-2025-27591

A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:facebook:below:*:*:*:*:*:rust:*:*

History

03 Jul 2025, 14:40

Type Values Removed Values Added
First Time Facebook
Facebook below
CPE cpe:2.3:a:facebook:below:*:*:*:*:*:rust:*:*
References () https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3 - () https://github.com/facebookincubator/below/commit/da9382e6e3e332fd2c3195e22f34977f83f0f1f3 - Patch
References () https://www.facebook.com/security/advisories/cve-2025-27591 - () https://www.facebook.com/security/advisories/cve-2025-27591 - Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2025/03/12/1 - () http://www.openwall.com/lists/oss-security/2025/03/12/1 - Exploit, Mailing List
CWE CWE-732

21 Mar 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

12 Mar 2025, 14:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/03/12/1 -
Summary
  • (es) En el servicio Below existía una vulnerabilidad de escalada de privilegios antes de la versión v0.9.0 debido a la creación de un directorio con permisos de escritura para todo el mundo en /var/log/below. Esto podría haber permitido que usuarios locales sin privilegios escalaran a privilegios de superusuario mediante ataques de enlaces simbólicos que manipulan archivos como /etc/shadow.

11 Mar 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 19:15

Updated : 2025-07-03 14:40


NVD link : CVE-2025-27591

Mitre link : CVE-2025-27591

CVE.ORG link : CVE-2025-27591


JSON object : View

Products Affected

facebook

  • below
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource