CVE-2022-31214
Firejail-0.9.68 - Local Privilege Escalation
Last updated
Firejail-0.9.68 - Local Privilege Escalation
Last updated
Firejail-0.9.68 - Local Privilege Escalation - Python
Vulnerability -->join.c
By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user still is default user , the NO_NEW_PRIVS, mount container. This way, setuid root binaries such as su
or sudo
.
Score: CVSS v2.0: 7.2
// CVSS v3.x: 7.8
Shows on:
HTB-