-
-
Notifications
You must be signed in to change notification settings - Fork 265
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-45752: D-Bus service allows configuration by any unprivileged user #473
Comments
PixlOne
added a commit
that referenced
this issue
Sep 28, 2024
Prevents arbitrary users from accessing d-bus interface. Fixes #473. This change now requires any application using the LogiOps D-Bus interface to run as root.
Merged
@hyperair Thank you for reporting, could you please confirm that this fixes the issue. |
Yep, I just verified that the updated dbus policy file prevents the exploit script from working. Note: To anyone testing out the exploit script, back up your logid.cfg first and restore it after |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
logiops, in its default configuration, allows any unprivileged user to configure its
logid
daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This could potentially enable privilege escalation with minimal user interaction required.The most basic proof-of-concept assigns a shell command to all buttons for connected peripherals. A more crafty attacker could tailor this operation to specific software used on the system, possibly monitoring the process list and mapping malicious macros at exactly the right moment.
References:
The text was updated successfully, but these errors were encountered: