Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5742: Improper Link Resolution Before File Access ('Link Following')

0
Medium
VulnerabilityCVE-2024-5742cvecve-2024-5742
Published: Wed Jun 12 2024 (06/12/2024, 08:53:02 UTC)
Source: CVE Database V5

Description

A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:39:30 UTC

Technical Analysis

CVE-2024-5742 is a vulnerability discovered in the GNU Nano text editor that arises from improper handling of temporary files during emergency saves. When Nano is unexpectedly killed while editing a file, it attempts to save the unsaved content into an emergency temporary file. This temporary file is created with the permissions of the user running Nano, but the process does not securely verify or restrict the resolution of symbolic links before file access. An attacker with local access can exploit this by creating a malicious symlink pointing the emergency file path to a sensitive system file or another user's file. When Nano writes to this emergency file, it inadvertently overwrites or modifies the target file, potentially escalating privileges or corrupting critical data. The vulnerability is classified with a CVSS 3.1 score of 6.7, indicating medium severity, with attack vector local (AV:L), attack complexity high (AC:H), privileges required low (PR:L), and user interaction required (UI:R). The impact includes high confidentiality, integrity, and availability consequences due to the possibility of overwriting sensitive files. No patches or exploits have been reported at the time of publication, but the vulnerability is publicly known and documented. This issue highlights the risks of insecure temporary file handling and the importance of secure symlink resolution in software that operates with elevated or user privileges.

Potential Impact

The primary impact of CVE-2024-5742 is the potential for local privilege escalation on systems where GNU Nano is installed and used. Attackers with local access can exploit this vulnerability to overwrite or manipulate files they should not have permission to modify, potentially leading to unauthorized access, data corruption, or system compromise. This can undermine system confidentiality, integrity, and availability. In multi-user environments such as shared servers, development workstations, or educational institutions, the risk is higher because multiple users have access to the same system. The vulnerability could be leveraged to escalate from a low-privileged user to higher privileges, facilitating further attacks or persistence. Although exploitation requires local access and user interaction, the medium CVSS score reflects the significant damage possible if exploited. Organizations relying on GNU Nano as a default or preferred editor on Linux/Unix systems should be aware of this risk, especially in environments where users have varying privilege levels.

Mitigation Recommendations

To mitigate CVE-2024-5742, organizations should first apply any available patches or updates from GNU Nano or their Linux distribution vendors as soon as they become available. In the absence of patches, administrators can implement strict file system permissions and monitor for suspicious symlink creation in directories where temporary files are stored. Restricting user permissions to prevent unauthorized symlink creation can reduce exploitation risk. Employing mandatory access controls (e.g., SELinux, AppArmor) to limit Nano's file write capabilities can also help contain potential damage. Additionally, educating users about the risks of killing Nano processes abruptly and encouraging proper shutdown procedures can minimize emergency file creation. System administrators should audit and monitor emergency file directories for unusual activity and consider using alternative editors with more secure temporary file handling in high-security environments. Finally, integrating file integrity monitoring tools to detect unauthorized file modifications can provide early warning of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-06-07T12:22:38.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69201212ce2640f942c372cd

Added to database: 11/21/2025, 7:17:38 AM

Last enriched: 2/28/2026, 3:39:30 AM

Last updated: 3/25/2026, 3:02:22 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses