Логотип exploitDog
bind:CVE-2025-23222
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-23222

Количество 3

Количество 3

nvd логотип

CVE-2025-23222

около 1 года назад

An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-8f27-8fr7-2363

около 1 года назад

An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges.

CVSS3: 8.4
EPSS: Низкий
fstec логотип

BDU:2025-05410

больше 1 года назад

Уязвимость демона dde-api-proxy операционной системы Deepin, позволяющая нарушителю получить привилегии root

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-23222

An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges.

CVSS3: 8.4
0%
Низкий
около 1 года назад
github логотип
GHSA-8f27-8fr7-2363

An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges.

CVSS3: 8.4
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-05410

Уязвимость демона dde-api-proxy операционной системы Deepin, позволяющая нарушителю получить привилегии root

CVSS3: 8.4
0%
Низкий
больше 1 года назад

Уязвимостей на страницу