Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13cG1yLXE4MjUteDRjNs4AAmd1

aptdaemon Information Disclosure via Improper Input Validation in Transaction class

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

Permalink: https://github.com/advisories/GHSA-wpmr-q825-x4c6
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13cG1yLXE4MjUteDRjNs4AAmd1
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: 9 months ago


CVSS Score: 4.0
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Identifiers: GHSA-wpmr-q825-x4c6, CVE-2020-15703
References: Repository: https://github.com/linuxmint/aptdaemon
Blast Radius: 1.9

Affected Packages

pypi:aptdaemon
Dependent packages: 0
Dependent repositories: 3
Downloads: 36 last month
Affected Version Ranges: < 1.1.1
Fixed in: 1.1.1
All affected versions:
All unaffected versions: 1.1.1