Insecure Package Installation in Click Allows Privilege Escalation

Insecure Package Installation in Click Allows Privilege Escalation

CVE-2015-8768 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

click/install.py in click does not require files in package filesystem tarballs to start with ./ (dot slash), which allows remote attackers to install an alternate security policy and gain privileges via a crafted package, as demonstrated by the test.mmrow app for Ubuntu phone.

Learn more about our Cis Benchmark Audit For Ubuntu Linux.