CVE-2023-52138
📋 TL;DR
Engrampa archive manager for MATE environment has a path traversal vulnerability when extracting CPIO or ISO archives. Attackers can craft malicious archives that exploit symlink following to write arbitrary files, leading to remote command execution. Users who extract untrusted archives with vulnerable Engrampa versions are affected.
💻 Affected Systems
- Engrampa (MATE archive manager)
📦 What is this software?
Engrampa by Mate Desktop
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root privileges via remote command execution when victim extracts malicious archive.
Likely Case
Local privilege escalation or arbitrary file writes leading to data theft or system manipulation.
If Mitigated
Limited impact if only trusted archives are processed or extraction occurs in sandboxed environment.
🎯 Exploit Status
Exploitation requires victim to extract malicious archive; public proof-of-concept exists in advisory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version containing commit 63d5dfa9005c6b16d0f0ccd888cc859fca78f970
Vendor Advisory: https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v
Restart Required: No
Instructions:
1. Update Engrampa via package manager. 2. For Debian/Ubuntu: sudo apt update && sudo apt upgrade engrampa. 3. For Fedora: sudo dnf update engrampa. 4. For source builds: apply commit 63d5dfa.
🔧 Temporary Workarounds
Disable CPIO extraction
linuxRemove or disable CPIO archive support in Engrampa
sudo apt remove cpio
sudo dnf remove cpio
Use alternative archive tool
linuxExtract archives with patched or alternative tools like file-roller
🧯 If You Can't Patch
- Avoid extracting untrusted CPIO or ISO archives with Engrampa
- Extract archives in isolated containers or virtual machines
🔍 How to Verify
Check if Vulnerable:
Check Engrampa version or verify if commit 63d5dfa is present in source
Check Version:
engrampa --version || dpkg -l engrampa || rpm -q engrampa
Verify Fix Applied:
Verify installed version includes commit 63d5dfa or check package version against patched releases
📡 Detection & Monitoring
Log Indicators:
- Unusual archive extraction processes
- Symlink creation in system directories
Network Indicators:
- Archive downloads from untrusted sources
SIEM Query:
Process creation where parent is engrampa and command includes suspicious file writes
🔗 References
- https://github.com/mate-desktop/engrampa/commit/63d5dfa9005c6b16d0f0ccd888cc859fca78f970
- https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v
- https://lists.debian.org/debian-lts-announce/2024/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IOJ3QWXTZGCXFEHP72ELY22PZ4AX2CB/
- https://github.com/mate-desktop/engrampa/commit/63d5dfa9005c6b16d0f0ccd888cc859fca78f970
- https://github.com/mate-desktop/engrampa/security/advisories/GHSA-c98h-v39w-3r7v
- https://lists.debian.org/debian-lts-announce/2024/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IOJ3QWXTZGCXFEHP72ELY22PZ4AX2CB/