CVE-2019-7304

CRITICAL

Canonical snapd <2.37.1 - Command Injection

Title source: llm

Description

Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.

Exploits (9)

exploitdb WORKING POC
by Chris Moberly · pythonlocallinux
https://www.exploit-db.com/exploits/46362
exploitdb WORKING POC
by Chris Moberly · pythonlocallinux
https://www.exploit-db.com/exploits/46361
nomisec WORKING POC 683 stars
by initstring · poc
https://github.com/initstring/dirty_sock
nomisec WORKING POC 6 stars
by SecuritySi · poc
https://github.com/SecuritySi/CVE-2019-7304_DirtySock
nomisec WORKING POC 1 stars
by f4T1H21 · poc
https://github.com/f4T1H21/dirty_sock
nomisec WORKING POC 1 stars
by elvi7major · poc
https://github.com/elvi7major/snap_priv_esc
gitlab WORKING POC
by initstring · poc
https://gitlab.com/initstring/dirty_sock
gitlab WORKING POC
by f4T1H21 · poc
https://gitlab.com/f4T1H21/dirty_sock
nomisec WRITEUP
by coby-nguyen · poc
https://github.com/coby-nguyen/Document-Linux-Privilege-Escalation

Scores

CVSS v3 9.8
EPSS 0.8254
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-863
Status published
Products (5)
canonical/snapd < 2.37.1
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
Published Apr 23, 2019
Tracked Since Feb 18, 2026