
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A critical security vulnerability (CVE-2024-45339) was discovered in github.com/golang/glog affecting versions before v1.2.4. The vulnerability was discovered in January 2025 and involves an insecure temporary file handling issue where logs are written to widely-writable directories. The vulnerability affects systems using the glog logging package, particularly when running with elevated privileges (Go Announce, Go Vuln).
The vulnerability stems from a predictable log file path creation mechanism where an unprivileged attacker can predict a privileged process's log file path and pre-create a symbolic link to a sensitive file in its place. When the privileged process runs, it follows the planted symlink and overwrites that sensitive file. The issue is particularly concerning when logs are written to widely-writable directories, which is the default behavior. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.1 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N (NVD).
The vulnerability can lead to unauthorized file overwrites of sensitive system files when exploited. This is particularly dangerous when the glog-enabled application runs with elevated privileges, as it could allow an attacker to manipulate critical system files through symbolic link manipulation. For example, an attacker could potentially target sensitive files like /etc/shadow through this vulnerability (GitHub PR).
The vulnerability has been fixed in glog version 1.2.4. The fix causes the program to exit with status code 2 when it finds that the configured log file already exists, preventing the symlink attack. Users are strongly advised to upgrade to this version. For those who build the Indico package themselves and cannot upgrade immediately, they can update the flask-multipass dependency to >=0.5.5 (Go Announce).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”