xpra server information disclosure
Xpra远程桌面工具存在漏洞,允许攻击者通过控制子系统启用敏感日志记录,并利用文件传输或剪贴板模块获取服务器日志信息。这些日志可能包含系统配置、用户凭证、代理服务器细节及加密密钥等敏感数据。该漏洞影响多个Linux发行版的旧版本。 2025-9-25 22:48:38 Author: seclists.org(查看原文) 阅读量:3 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Antoine Martin via Fulldisclosure <fulldisclosure () seclists org>
Date: Wed, 24 Sep 2025 17:05:13 +0700

1) About Xpra
Xpra is known as "screen for X11".
https://xpra.org/
"Xpra forwards and synchronizes many extra desktop features, which allows remote applications to integrate transparently into the client's desktop environment: audio input and output, printers, clipboard, system trays, notifications, webcams, etc."

2) Vulnerability
Using the server's "control" subsystem, a client can enable sensitive debug logging, ie: "network", "crypto", "keyboard" or "auth" categories.
Newer versions even include a GUI for doing so more easily:
https://github.com/Xpra-org/xpra/issues/4666

Then using the "file-transfer" module, the server's log file can be retrieved. Alternatively, the "clipboard" subsystem could also be used to transfer this log data to the client if it can somehow be copied to the clipboard (ie using xclip). Even the most basic window forwarding could be used to transfer the data in pixel form, either eyeballing it or OCRing it on the client side.

Although the user would usually first need to authenticate to access the session, there are many use-cases where the log data may still expose sensitive information:
* system configuration, paths, etc
* multi-client setups could leak other user's credentials, or record all keyboard events (effectively a keylogger) * proxied sessions could leak the proxy server's connection details and credentials
* server encryption keys
etc

3) Affected versions
All versions prior to 6.3.3 stable and 5.1.2 LTS.
EPEL, Fedora, Debian, Ubuntu are all shipping vulnerable versions.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • xpra server information disclosure Antoine Martin via Fulldisclosure (Sep 25)

文章来源: https://seclists.org/fulldisclosure/2025/Sep/68
如有侵权请联系:admin#unsafe.sh