CVE-2023-50700

7.8 HIGH

📋 TL;DR

This vulnerability allows unprivileged users to execute privileged operations through D-Bus methods in Deepin's dde-file-manager. It affects Deepin Linux users running dde-file-manager version 6.0.54 and earlier. Attackers can potentially perform unauthorized system actions.

💻 Affected Systems

Products:
  • Deepin dde-file-manager
Versions: 6.0.54 and earlier
Operating Systems: Deepin Linux, Linux distributions using Deepin components
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Deepin Linux and any distribution using vulnerable versions of dde-file-manager.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation allowing unprivileged users to gain root privileges and fully compromise the system.

🟠

Likely Case

Unauthorized file operations, privilege escalation to perform administrative tasks, or system configuration changes.

🟢

If Mitigated

Limited impact with proper D-Bus policy restrictions and user isolation in place.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring user access to the system.
🏢 Internal Only: HIGH - Any local user or compromised account can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is relatively straightforward via D-Bus method calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.55 or later

Vendor Advisory: https://github.com/linuxdeepin/developer-center/issues/10007

Restart Required: Yes

Instructions:

1. Update Deepin system packages. 2. Specifically update dde-file-manager to version 6.0.55 or later. 3. Restart the system or at least the D-Bus service and file manager.

🔧 Temporary Workarounds

Restrict D-Bus access

linux

Modify D-Bus policy to restrict access to vulnerable dde-file-manager methods

sudo nano /etc/dbus-1/system.d/org.deepin.dde.FileManager1.conf
Add deny rules for unprivileged users

Disable vulnerable service

linux

Temporarily disable dde-file-manager D-Bus service

sudo systemctl stop dde-file-manager
sudo systemctl disable dde-file-manager

🧯 If You Can't Patch

  • Implement strict user privilege separation and limit local user access
  • Monitor D-Bus traffic for suspicious method calls to org.deepin.dde.FileManager1

🔍 How to Verify

Check if Vulnerable:

Check dde-file-manager version: dpkg -l | grep dde-file-manager or rpm -qa | grep dde-file-manager

Check Version:

dde-file-manager --version || dpkg -l | grep dde-file-manager

Verify Fix Applied:

Verify version is 6.0.55 or later and test D-Bus method calls from unprivileged user account

📡 Detection & Monitoring

Log Indicators:

  • D-Bus authorization failures
  • Unauthorized access attempts to org.deepin.dde.FileManager1 service

Network Indicators:

  • Local D-Bus traffic spikes
  • Unusual D-Bus method calls

SIEM Query:

source="d-bus" AND (service="org.deepin.dde.FileManager1" AND user!="root")

🔗 References

📤 Share & Export