Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47515: UNIX Symbolic Link (Symlink) Following

0
High
VulnerabilityCVE-2024-47515cvecve-2024-47515
Published: Tue Dec 24 2024 (12/24/2024, 03:26:31 UTC)
Source: CVE Database V5

Description

A vulnerability was found in Pagure. Support of symbolic links during repository archiving of repositories allows the disclosure of local files. This flaw allows a malicious user to take advantage of the Pagure instance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:49:32 UTC

Technical Analysis

CVE-2024-47515 is a vulnerability identified in Pagure version 5.14.1, a popular open-source git-centered forge used for managing source code repositories. The flaw arises from the way Pagure handles symbolic links during the archiving process of repositories. Specifically, when Pagure creates archive files of repositories, it follows symbolic links instead of treating them as links, which can lead to unintended disclosure of local files outside the repository directory. This behavior allows a malicious user with at least limited privileges on the Pagure instance to craft repositories containing symlinks pointing to sensitive local files. When these repositories are archived, the contents of the linked files are included in the archive, thereby exposing potentially sensitive information. The vulnerability has a CVSS 3.1 base score of 8.1, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity. Although no exploits have been reported in the wild yet, the vulnerability poses a significant risk due to the sensitive nature of files that could be disclosed and the widespread use of Pagure in enterprise and open-source environments. The flaw does not affect availability but can lead to serious data leakage and compromise of trust in the integrity of repository archives.

Potential Impact

The primary impact of CVE-2024-47515 is the unauthorized disclosure of local files on servers running vulnerable versions of Pagure. This can lead to exposure of sensitive information such as configuration files, credentials, private keys, or proprietary source code. Such data leakage can facilitate further attacks, including privilege escalation, lateral movement, or intellectual property theft. The integrity of repository archives is also compromised, as malicious actors can manipulate archive contents via symlinks. Organizations relying on Pagure for source code management, especially those hosting private or sensitive projects, face increased risk of data breaches. Since the vulnerability requires some level of privilege, insider threats or compromised accounts could exploit this flaw to escalate damage. The lack of known exploits in the wild suggests a window for proactive mitigation, but the high CVSS score underscores the urgency. The impact is especially critical for organizations in sectors with stringent data protection requirements, such as finance, government, and technology.

Mitigation Recommendations

To mitigate CVE-2024-47515, organizations should first upgrade Pagure to a version where this vulnerability is patched once available. In the absence of an immediate patch, administrators should implement strict access controls to limit repository creation and archiving privileges to trusted users only. Review and sanitize repositories for suspicious symbolic links before archiving. Consider disabling or restricting the archiving feature temporarily if feasible. Employ file system monitoring to detect unusual symlink activity or unexpected file access patterns. Additionally, containerizing or sandboxing Pagure instances can reduce the risk of local file exposure. Regularly audit server configurations and logs for signs of exploitation attempts. Educate developers and users about the risks of including symlinks in repositories. Finally, maintain an incident response plan to quickly address any suspected data leakage stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-25T19:03:05.110Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d08b7ef31ef0b56d5ad

Added to database: 2/25/2026, 9:43:36 PM

Last enriched: 2/26/2026, 8:49:32 AM

Last updated: 4/11/2026, 9:26:30 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses