10
CVSSv2

CVE-2015-1815

Published: 30/03/2015 Updated: 13/02/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot prior to 3.2.22 allows remote malicious users to execute arbitrary commands via shell metacharacters in a file name.

Vulnerable Product Search on Vulmon Subscribe to Product

selinux setroubleshoot

fedoraproject fedora 22

Vendor Advisories

It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command ...

Exploits

setroubleshoot tries to find out which rpm a particular file belongs to when it finds SELinux access violation reports The idea is probably to have convenient reports for the admin which type enforcement rules have to be relaxed setroubleshoot runs as root (although in its own domain) In utilpy we have: 266 def get_rpm_nvr_by_file_path_tempor ...