{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2017-7358", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "41923", "refsource" : "EXPLOIT-DB", "url" : "https://www.exploit-db.com/exploits/41923/" }, { "name" : "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478", "refsource" : "CONFIRM", "url" : "http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478" }, { "name" : "https://launchpad.net/bugs/1677924", "refsource" : "CONFIRM", "url" : "https://launchpad.net/bugs/1677924" }, { "name" : "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html", "refsource" : "CONFIRM", "url" : "https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html" }, { "name" : "https://www.ubuntu.com/usn/usn-3255-1/", "refsource" : "CONFIRM", "url" : "https://www.ubuntu.com/usn/usn-3255-1/" }, { "name" : "97486", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/97486" } ] } }