Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11934

Опубликовано: 29 июл. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.9
CVSS3: 5.9

Описание

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

РелизСтатусПримечание
bionic

released

2.45.1+18.04.2
devel

released

2.46~pre1.gitaf15176
eoan

released

2.45.1+19.10.2
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.45.1+18.04.2
esm-infra/focal

released

2.45.1+20.04.2
esm-infra/xenial

released

2.45.1ubuntu0.2
focal

released

2.45.1+20.04.2
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 14%
0.00045
Низкий

1.9 Low

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
больше 5 лет назад

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

CVSS3: 5.9
debian
больше 5 лет назад

It was discovered that snapctl user-open allowed altering the $XDG_DAT ...

github
больше 3 лет назад

It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.

EPSS

Процентиль: 14%
0.00045
Низкий

1.9 Low

CVSS2

5.9 Medium

CVSS3

Уязвимость CVE-2020-11934