CVE-2017-9780

Severity
7.8HIGH
EPSS
0.0%
top 87.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 21
Latest updateMay 13

Description

In Flatpak before 0.8.7, a third-party app repository could include malicious apps that contain files with inappropriate permissions, for example setuid or world-writable. The files are deployed with those permissions, which would let a local attacker run the setuid executable or write to the world-writable location. In the case of the "system helper" component, files deployed as part of the app are owned by root, so in the worst case they could be setuid root.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debianflatpak< 0.8.7-1+3
NVDflatpak/flatpak0.8.6

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-jchq-9f4q-gvc5: In Flatpak before 02022-05-13
OSV
CVE-2017-9780: In Flatpak before 02017-06-21
CVEList
CVE-2017-9780: In Flatpak before 02017-06-21

📋Vendor Advisories

2
Red Hat
flatpak: Privilege escalation via setuid/world-writable file permissions2017-06-12
Debian
CVE-2017-9780: flatpak - In Flatpak before 0.8.7, a third-party app repository could include malicious ap...2017

💬Community

2
Bugzilla
CVE-2017-9780 flatpak: Privilege escalation via setuid/world-writable file permissions2017-06-26
Bugzilla
CVE-2017-9780 flatpak: Privilege escalation via setuid/world-writable file permissions [fedora-24]2017-06-26
CVE-2017-9780 (HIGH CVSS 7.8) | In Flatpak before 0.8.7 | cvebase.io