{"api_version":"1","generated_at":"2026-04-23T04:10:32+00:00","cve":"CVE-2020-8013","urls":{"html":"https://cve.report/CVE-2020-8013","api":"https://cve.report/api/cve/CVE-2020-8013.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-8013","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-8013"},"summary":{"title":"CVE-2020-8013","description":"A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.","state":"PUBLIC","assigner":"security@suse.com","published_at":"2020-03-02 17:15:00","updated_at":"2022-12-08 03:09:00"},"problem_types":["CWE-59"],"metrics":[],"references":[{"url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html","name":"openSUSE-SU-2020:0302","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2020:0302-1: moderate: Security update f","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1163922","name":"https://bugzilla.suse.com/show_bug.cgi?id=1163922","refsource":"CONFIRM","tags":["Issue Tracking","Vendor Advisory"],"title":"Bug 1163922 – VUL-0: CVE-2020-8013: permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-8013","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8013","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"opensuse","cpe5":"leap","cpe6":"15.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"8013","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"suse","cpe5":"linux_enterprise_server","cpe6":"15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-8013","qid":"750751","title":"SUSE Enterprise Linux Security Update for permissions (SUSE-SU-2021:2280-1)"},{"cve":"CVE-2020-8013","qid":"751472","title":"OpenSUSE Security Update for permissions (openSUSE-SU-2021:1520-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@suse.com","DATE_PUBLIC":"2020-02-28T00:00:00.000Z","ID":"CVE-2020-8013","STATE":"PUBLIC","TITLE":"permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SUSE Linux Enterprise Server 12","version":{"version_data":[{"version_affected":"<","version_name":"permissions","version_value":"2015.09.28.1626-17.27.1"}]}},{"product_name":"SUSE Linux Enterprise Server 15","version":{"version_data":[{"version_affected":"<","version_name":"permissions","version_value":"20181116-9.23.1"}]}},{"product_name":"SUSE Linux Enterprise Server 11","version":{"version_data":[{"version_affected":"<","version_name":"permissions","version_value":"2013.1.7-0.6.12.1"}]}}]},"vendor_name":"SUSE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":2.2,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-59: Improper Link Resolution Before File Access ('Link Following')"}]}]},"references":{"reference_data":[{"refsource":"SUSE","name":"openSUSE-SU-2020:0302","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00010.html"},{"name":"https://bugzilla.suse.com/show_bug.cgi?id=1163922","refsource":"CONFIRM","url":"https://bugzilla.suse.com/show_bug.cgi?id=1163922"}]},"source":{"advisory":"https://bugzilla.suse.com/show_bug.cgi?id=1163922","defect":["1163922"],"discovery":"INTERNAL"}},"nvd":{"publishedDate":"2020-03-02 17:15:00","lastModifiedDate":"2022-12-08 03:09:00","problem_types":["CWE-59"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW"},"exploitabilityScore":1,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:N/I:P/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:11:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"8013","Ordinal":"168339","Title":"CVE-2020-8013","CVE":"CVE-2020-8013","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"8013","Ordinal":"1","NoteData":"A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"8013","Ordinal":"2","NoteData":"2020-03-02","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"8013","Ordinal":"3","NoteData":"2020-11-19","Type":"Other","Title":"Modified"}]}}}