fkie_cve-2025-64343
Vulnerability from fkie_nvd
Published
2025-11-07 06:15
Modified
2025-11-12 16:20
Summary
(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0.
Impacted products
Vendor Product Version



{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "(conda) Constructor is a tool that enables users to create installers for conda package collections. In versions 3.12.2 and below, the  installation directory inherits permissions from its parent directory. Outside of restricted directories, the permissions are very permissive and often allow write access by authenticated users. Any logged in user can make modifications during the installation for both single-user and all-user installations. This constitutes a local attack vector if the installation is in a directory local users have access to. For single-user installations in a shared directory, these permissions persist after the installation. This issue is fixed in version 3.13.0."
    },
    {
      "lang": "es",
      "value": "Constructor es una herramienta que permite a los usuarios crear instaladores para colecciones de paquetes conda. En las versiones 3.12.2 e inferiores, el directorio de instalaci\u00f3n hereda los permisos de su directorio padre. Fuera de los directorios restringidos, los permisos son muy permisivos y a menudo permiten el acceso de escritura por parte de usuarios autenticados. Cualquier usuario con sesi\u00f3n iniciada puede realizar modificaciones durante la instalaci\u00f3n, tanto para instalaciones de un solo usuario como para instalaciones de todos los usuarios. Esto constituye un vector de ataque local si la instalaci\u00f3n se encuentra en un directorio al que los usuarios locales tienen acceso. Para instalaciones de un solo usuario en un directorio compartido, estos permisos persisten despu\u00e9s de la instalaci\u00f3n. Este problema se corrige en la versi\u00f3n 3.13.0."
    }
  ],
  "id": "CVE-2025-64343",
  "lastModified": "2025-11-12T16:20:22.257",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-11-07T06:15:33.673",
  "references": [
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/conda/constructor/commit/c368383710a7c2b81ad1b0ecb9724b38d3577447"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/conda/constructor/releases/tag/3.13.0"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://github.com/conda/constructor/security/advisories/GHSA-vvpr-2qg4-2mrq"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-289"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…