Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15703

Опубликовано: 31 окт. 2020
Источник: debian
EPSS Низкий

Описание

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
aptdaemonremovedpackage

Примечания

  • https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1888235

EPSS

Процентиль: 14%
0.00044
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
больше 5 лет назад

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

CVSS3: 4
nvd
больше 5 лет назад

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

CVSS3: 4
github
больше 3 лет назад

aptdaemon Information Disclosure via Improper Input Validation in Transaction class

EPSS

Процентиль: 14%
0.00044
Низкий