There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-5615 There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Github GHSA Github GHSA GHSA-wpmr-q825-x4c6 aptdaemon Information Disclosure via Improper Input Validation in Transaction class
Ubuntu USN Ubuntu USN USN-4537-1 Aptdaemon vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-16T22:01:51.102Z

Reserved: 2020-07-14T00:00:00

Link: CVE-2020-15703

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-31T04:15:10.897

Modified: 2024-11-21T05:06:03.287

Link: CVE-2020-15703

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.