Exploitation Summary
EIP tracks 1 public exploit for CVE-2020-25265. PoCs published by refi64.
AI-analyzed exploit summary This PoC exploits CVE-2020-25265 and CVE-2020-25266 by embedding an ELF executable and AppImage headers in an MP3 file, which is then used to override a system-installed application via a malicious desktop file. The exploit leverages libappimage's lack of validation for the 'Name' field in desktop files.
Description
AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components.
Exploits (1)
This PoC exploits CVE-2020-25265 and CVE-2020-25266 by embedding an ELF executable and AppImage headers in an MP3 file, which is then used to override a system-installed application via a malicious desktop file. The exploit leverages libappimage's lack of validation for the 'Name' field in desktop files.
References (1)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N