| ID |
CVE-2025-12744
|
| Sažetak |
A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges. |
| Reference |
|
| CVSS |
| Base: | 8.8 |
| Impact: | 6.0 |
| Exploitability: | 2.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
LOW |
LOW |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
HIGH |
HIGH |
|
| CVSS vektor |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
| Zadnje važnije ažuriranje |
04-12-2025 - 17:15 |
| Objavljeno |
03-12-2025 - 09:15 |