Impact
This vulnerability allows a remote authenticated attacker to read or overwrite any file on the Netatalk server by creating a symbolic link to that file in a location where Netatalk can resolve it. By controlling the symlink creation, the attacker can target sensitive configuration files or other privileged data. The flaw is a classic improper link resolution issue, categorized as CWE-59, and does not provide code execution or denial of service, but the ability to read or modify arbitrary files can lead to compromise of confidential information or system integrity.
Affected Systems
Netatalk versions 3.0.2 through 4.4.2 are affected. The vulnerability is fixed in 4.4.3; all other versions from the same series share the same issue.
Risk and Exploitability
With a CVSS score of 8.1, this flaw is considered high severity. While the EPSS score is not available, the lack of listing in the CISA KEV catalog suggests no widespread exploitation detected yet, but the attack vector is likely over the network via AFP or Samba services. An attacker who can influence the creation of symbolic links in the server’s shared directories—whether through an authenticated session or a local privilege exploitation—can read arbitrary files or overwrite them. The risk is significant for systems that expose sensitive information or rely on strict data isolation.
OpenCVE Enrichment
Debian DSA