Description
An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level.
References (5)
Core 5
Core References
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html
Mailing List, Third Party Advisory
https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html
Broken Link issue-tracking
permissions-required
https://gitlab.com/flightgear/flightgear/-/issues/3025
Scores
CVSS v3
8.6
EPSS
0.0004
EPSS Percentile
12.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-863
Status
published
Products (2)
debian/debian_linux
11.0
flightgear/simgear
< 2020.3.19
Published
Jan 28, 2025
Tracked Since
Feb 18, 2026