CVE-2017-7358

HIGH

LightDM <1.22.0 - Path Traversal

Title source: llm
STIX 2.1

Description

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

Exploits (2)

exploitdb WORKING POC
by G. Geshev · textlocallinux
https://www.exploit-db.com/exploits/41923
nomisec WORKING POC
by JonPichel · poc
https://github.com/JonPichel/CVE-2017-7358

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry x_refsource_confirm
https://launchpad.net/bugs/1677924
Third Party Advisory, VDB Entry x_refsource_confirm
https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html
Third Party Advisory, VDB Entry x_refsource_confirm
http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/41923/
Third Party Advisory x_refsource_confirm
https://www.ubuntu.com/usn/usn-3255-1/
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/97486

Scores

CVSS v3 7.3
EPSS 0.0174
EPSS Percentile 82.6%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (3)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 16.10
lightdm_project/lightdm < 1.22.0
Published Apr 05, 2017
Tracked Since Feb 18, 2026