Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.
References
| Link | Resource |
|---|---|
| https://github.com/himmelblau-idm/himmelblau/security/advisories/GHSA-44wm-q286-ghq3 | Exploit Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-11 20:16
Updated : 2026-03-16 18:18
NVD link : CVE-2026-31979
Mitre link : CVE-2026-31979
CVE.ORG link : CVE-2026-31979
JSON object : View
Products Affected
himmelblau-idm
- himmelblau
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
