In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup.
During installation, installed file permissions are set to allow anyone to modify those files.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://github.com/canonical/multipass/security/advisories/GHSA-2j82-p5cq-62p3 | exploit vendor advisory patch |
https://github.com/canonical/multipass/pull/4115 | issue tracking patch |