Описание
A flaw was found in evolution-data-server. Inconsistent comparison logic in the addressbook file backend allows a Flatpak application with D-Bus access to craft a malicious URI containing directory traversal sequences. This URI is stored without proper validation during contact creation or modification. Later, during contact deletion, the URI is processed with a less strict check, leading to the deletion of arbitrary files on the host filesystem. This could potentially include critical Flatpak override files.
Отчет
This is a MODERATE impact flaw in evolution-data-server where inconsistent URI handling can lead to arbitrary file deletion. A Flatpak application with D-Bus access to the addressbook service can exploit this vulnerability by crafting a malicious URI with directory traversal sequences, potentially deleting critical Flatpak override files on the host filesystem.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | evolution-data-server | Fix deferred | ||
| Red Hat Enterprise Linux 6 | evolution-data-server | Fix deferred | ||
| Red Hat Enterprise Linux 7 | evolution-data-server | Fix deferred | ||
| Red Hat Enterprise Linux 8 | evolution-data-server | Fix deferred | ||
| Red Hat Enterprise Linux 9 | evolution-data-server | Fix deferred |
Показывать по
Дополнительная информация
Статус:
5.6 Medium
CVSS3
Связанные уязвимости
5.6 Medium
CVSS3