Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5962

Опубликовано: 10 июн. 2025
Источник: redhat
CVSS3: 7.7

Описание

A flaw was found in the Lightspeed history service. Insufficient access controls allow a local, unprivileged user to access and manipulate the chat history of another user on the same system. By abusing inter-process communication calls to the history service, an attacker can view, delete, or inject arbitrary history entries, including misleading or malicious commands. This can be used to deceive another user into executing harmful actions, posing a risk of privilege misuse or unauthorized command execution through social engineering.

Отчет

The Red Hat Product Security team assesses the severity of this vulnerability as Moderate, despite a CVSS v3.1 base score of 7.7. The issue is limited to local exploitation and does not require elevated privileges, making it accessible to any standard user on the system. Successful exploitation allows unauthorized access and manipulation of another user's chat history, potentially leading to exposure of sensitive data or injection of misleading commands. However, the impact is constrained to multi-user environments and does not affect remote systems or cause service disruption.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria, which include ease of use and deployment, applicability to a widespread installation base, and system stability.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2371363rhel-lightspeed: Improper Access Control in Lightspeed History Management Allows Local Privilege Manipulation

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
nvd
3 месяца назад

A flaw was found in the Lightspeed history service. Insufficient access controls allow a local, unprivileged user to access and manipulate the chat history of another user on the same system. By abusing inter-process communication calls to the history service, an attacker can view, delete, or inject arbitrary history entries, including misleading or malicious commands. This can be used to deceive another user into executing harmful actions, posing a risk of privilege misuse or unauthorized command execution through social engineering.

CVSS3: 7.7
github
3 месяца назад

A flaw was found in the Lightspeed history service. Insufficient access controls allow a local, unprivileged user to access and manipulate the chat history of another user on the same system. By abusing inter-process communication calls to the history service, an attacker can view, delete, or inject arbitrary history entries, including misleading or malicious commands. This can be used to deceive another user into executing harmful actions, posing a risk of privilege misuse or unauthorized command execution through social engineering.

7.7 High

CVSS3