Seatd privilege escalation | CVE-2022-25643
NAME
Seatd privilege escalation
- Platforms Affected:
seatd seatd 0.6.3 - Risk Level:
8.8 - Exploitability:
Unproven - Consequences:
Gain Privileges
DESCRIPTION
Seatd could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw in the seatd-launch component. By sending a specially-crafted request using the socket pathname parameter, an attacker could exploit this vulnerability to remove files with escalated privileges.
CVSS 3.0 Information
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Upgrade to the latest version of seatd (0.6.4 or later), available from the seatd GIT Repository. See References.
- Reference Link:
https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CETEO7R.QG8B1KGD531R1%40kl.wtf%3E - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25643
If you like the site, please consider joining the telegram channel and supporting us on Patreon using the button below.