Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (CWE-88)
Flatpak versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8 contain a vulnerability that allows a malicious or compromised Flatpak app to execute arbitrary code outside its sandbox by passing bwrap arguments or an arbitrary command line to the org.freedesktop.portal.Background.RequestBackground interface.
This vulnerability could allow a malicious Flatpak app to completely escape the sandbox and execute arbitrary code on the host system with the privileges of the user running the app, potentially leading to further compromise of the system.
There is no information provided about active exploitation of this vulnerability in the wild or public proof-of-concept code.
This vulnerability is patched in Flatpak versions 1.15.8, 1.10.9, 1.12.9, and 1.14.6. Users should upgrade to these patched versions or later releases.
As a mitigation, xdg-desktop-portal version 1.18.4 will prevent Flatpak apps from creating .desktop files for commands that start with --, which would help prevent this attack vector. However, upgrading to the patched Flatpak versions is the full solution.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Feedly found the first article mentioning CVE-2024-32462. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-32462
A CVSS base score of 8.4 has been assigned.
This CVE started to trend in security discussions
RedHat CVE advisory released a security advisory (CVE-2024-32462).
EPSS Score was set to: 0.05% (Percentile: 14.2%)
Detection for the vulnerability has been added to Qualys (6000580)
Detection for the vulnerability has been added to Nessus (193600)