snapd 2.37 (Ubuntu) dirty_sock Local Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 14 Feb 2019.

  1. Packet Storm

    Packet Storm Guest

    This exploit bypasses access control checks to use a restricted API function (POST /v2/create-user) of the local snapd service. This queries the Ubuntu SSO for a username and public SSH key of a provided email address, and then creates a local user based on these value. Successful exploitation for this version requires an outbound Internet connection and an SSH service accessible via localhost. This is one of two proof of concepts related to this issue. Versions below 2.37.1 are affected.

    Continue reading...
     

Share This Page

Loading...