CVE-2015-8768

click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
Configurations

Configuration 1 (hide)

cpe:2.3:a:click_project:click:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-02-13 18:59

Updated : 2024-02-28 15:44


NVD link : CVE-2015-8768

Mitre link : CVE-2015-8768

CVE.ORG link : CVE-2015-8768


JSON object : View

Products Affected

canonical

  • ubuntu_linux

click_project

  • click
CWE
CWE-264

Permissions, Privileges, and Access Controls