Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-9950

CWE-22Path Traversal7 documents6 sources
Severity
7.8HIGH
EPSS
0.7%
top 27.33%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 17
Latest updateMay 17

Description

An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Ubuntuapport< 2.14.1-0ubuntu3.23+1

Patches

🔴Vulnerability Details

4
GHSA
GHSA-rgrg-wm7f-3pp8: An issue was discovered in Apport before 22022-05-17
CVEList
CVE-2016-9950: An issue was discovered in Apport before 22016-12-17
OSV
CVE-2016-9950: An issue was discovered in Apport before 22016-12-14
OSV
apport vulnerabilities2016-12-14

💥Exploits & PoCs

1
Exploit-DB
Apport 2.x (Ubuntu Desktop 12.10 < 16.04) - Local Code Execution2016-12-14

📋Vendor Advisories

1
Ubuntu
Apport vulnerabilities2016-12-14
CVE-2016-9950 (HIGH CVSS 7.8) | An issue was discovered in Apport b | cvebase.io