A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 03 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 03 Dec 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges. | |
| Title | Abrt: command-injection in abrt leading to local privilege escalation | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published: 2025-12-03T08:33:06.547Z
Updated: 2025-12-03T14:21:59.766Z
Reserved: 2025-11-05T11:48:30.039Z
Link: CVE-2025-12744
Updated: 2025-12-03T14:21:53.408Z
Status : Awaiting Analysis
Published: 2025-12-03T09:15:46.390
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-12744
ReportizFlow