Логотип exploitDog
bind:CVE-2021-21381
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21381

Количество 8

Количество 8

ubuntu логотип

CVE-2021-21381

почти 5 лет назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted s...

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2021-21381

почти 5 лет назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted s...

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2021-21381

почти 5 лет назад

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sour

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2021-21381

почти 5 лет назад

Flatpak is a system for building, distributing, and running sandboxed ...

CVSS3: 7.1
EPSS: Низкий
oracle-oval логотип

ELSA-2021-1068

почти 5 лет назад

ELSA-2021-1068: flatpak security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1002

почти 5 лет назад

ELSA-2021-1002: flatpak security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2021-01908

почти 5 лет назад

Уязвимость опции file forwarding инструмента для управления приложениями и средами Flatpak, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 9.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2990-1

больше 3 лет назад

Security update for flatpak

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-21381

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted s...

CVSS3: 7.1
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2021-21381

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted s...

CVSS3: 8.1
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2021-21381

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In Flatpack since version 0.9.4 and before version 1.10.2 has a vulnerability in the "file forwarding" feature which can be used by an attacker to gain access to files that would not ordinarily be allowed by the app's permissions. By putting the special tokens `@@` and/or `@@u` in the Exec field of a Flatpak app's .desktop file, a malicious app publisher can trick flatpak into behaving as though the user had chosen to open a target file with their Flatpak app, which automatically makes that file available to the Flatpak app. This is fixed in version 1.10.2. A minimal solution is the first commit "`Disallow @@ and @@U usage in desktop files`". The follow-up commits "`dir: Reserve the whole @@ prefix`" and "`dir: Refuse to export .desktop files with suspicious uses of @@ tokens`" are recommended, but not strictly required. As a workaround, avoid installing Flatpak apps from untrusted sour

CVSS3: 7.1
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2021-21381

Flatpak is a system for building, distributing, and running sandboxed ...

CVSS3: 7.1
0%
Низкий
почти 5 лет назад
oracle-oval логотип
ELSA-2021-1068

ELSA-2021-1068: flatpak security update (IMPORTANT)

почти 5 лет назад
oracle-oval логотип
ELSA-2021-1002

ELSA-2021-1002: flatpak security update (IMPORTANT)

почти 5 лет назад
fstec логотип
BDU:2021-01908

Уязвимость опции file forwarding инструмента для управления приложениями и средами Flatpak, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

CVSS3: 9.3
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:2990-1

Security update for flatpak

больше 3 лет назад

Уязвимостей на страницу