Description
click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-8640 | click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone. |
Ubuntu USN |
USN-2771-1 | Click vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T08:29:21.560Z
Reserved: 2016-01-12T00:00:00.000Z
Link: CVE-2015-8768
No data.
Status : Modified
Published: 2017-02-13T18:59:00.267
Modified: 2026-05-13T00:24:29.033
Link: CVE-2015-8768
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN