Vulnerability Details : CVE-2018-19358
Potential exploit
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.
Products affected by CVE-2018-19358
- cpe:2.3:a:gnome:gnome-keyring:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-19358
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-19358
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
References for CVE-2018-19358
-
https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550
Credentials located in gnome-keyring can be compromised easily. (#5) · Issues · GNOME / gnome-keyring · GitLab
-
https://www.youtube.com/watch?v=Do4E9ZQaPck
Credentials located in gnome-keyring can be compromised easily - YouTubeExploit;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1652194#c8
1652194 – (CVE-2018-19358) CVE-2018-19358 gnome-keyring: login credentials retrieval via a Secret Service API call
-
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365
Bug #1780365 “Credentials located in gnome-keyring can be compro...” : Bugs : gnome-keyring package : UbuntuExploit;Issue Tracking;Third Party Advisory
-
https://github.com/sungjungk/keyring_crack
GitHub - sungjungk/keyring_crackExploit;Third Party Advisory
Jump to