Description
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Published: 2020-10-31
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-5615 There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Github GHSA Github GHSA GHSA-wpmr-q825-x4c6 aptdaemon Information Disclosure via Improper Input Validation in Transaction class
Ubuntu USN Ubuntu USN USN-4537-1 Aptdaemon vulnerability
History

No history.

Subscriptions

Aptdaemon Project Aptdaemon
cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2024-09-16T22:01:51.102Z

Reserved: 2020-07-14T00:00:00.000Z

Link: CVE-2020-15703

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-31T04:15:10.897

Modified: 2024-11-21T05:06:03.287

Link: CVE-2020-15703

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses