Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13cG1yLXE4MjUteDRjNs4AAmd1
aptdaemon Information Disclosure via Improper Input Validation in Transaction class
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Permalink: https://github.com/advisories/GHSA-wpmr-q825-x4c6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13cG1yLXE4MjUteDRjNs4AAmd1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 9 months ago
CVSS Score: 4.0
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-wpmr-q825-x4c6, CVE-2020-15703
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-15703
- https://ubuntu.com/security/notices/USN-4537-1
- https://www.eyecontrol.nl/blog/the-story-of-3-cves-in-ubuntu-desktop.html
- https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1888235
- https://github.com/linuxmint/aptdaemon/blob/4d24cb61575ac6fbee8d5e61ef933e6093ee0a2e/debian/patches/CVE-2020-15703.patch
- https://github.com/advisories/GHSA-wpmr-q825-x4c6
Blast Radius: 1.9
Affected Packages
pypi:aptdaemon
Dependent packages: 0Dependent repositories: 3
Downloads: 36 last month
Affected Version Ranges: < 1.1.1
Fixed in: 1.1.1
All affected versions:
All unaffected versions: 1.1.1