Vulnerability Name:

CVE-2015-8768 (CCN-110806)

Assigned:2016-01-12
Published:2016-01-12
Updated:2017-10-03
Summary:click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: CONFIRM
Type: UNKNOWN
http://bazaar.launchpad.net/~click-hackers/click/devel/revision/587

Source: CCN
Type: click Web page
click

Source: MITRE
Type: CNA
CVE-2015-8768

Source: CCN
Type: oss-sec Mailing List, Tue, 12 Jan 2016 11:57:30 -0500 (EST)
Re: CVE Request: click

Source: UBUNTU
Type: Third Party Advisory
USN-2771-1

Source: MLIST
Type: Mailing List, Patch, Third Party Advisory
[oss-security] 20160112 Re: CVE Request: click

Source: BID
Type: Third Party Advisory, VDB Entry
96386

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1506467

Source: CONFIRM
Type: Issue Tracking, Patch, Third Party Advisory
https://code.launchpad.net/~cjwatson/click/audit-missing-dot-slash/+merge/274554

Source: XF
Type: UNKNOWN
click-cve20158768-sec-bypass(110806)

Source: CONFIRM
Type: UNKNOWN
https://insights.ubuntu.com/2015/10/15/update-on-ubuntu-phone-security-issue/

Source: MISC
Type: UNKNOWN
https://plus.google.com/+SzymonWaliczek/posts/3jbG2uiAniF

Vulnerable Configuration:Configuration 1:
  • cpe:/a:click_project:click:-:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20158768000
    V
    CVE-2015-8768 on Ubuntu 14.04 LTS (trusty) - critical.
    2017-02-13
    BACK
    click_project click -
    canonical ubuntu linux 14.04
    canonical ubuntu linux 15.04