CVE-2020-15703 – aptdaemon
Package
Manager: pip
Name: aptdaemon
Vulnerable Version: >=0 <1.1.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00044 pctl0.12802
Details
aptdaemon Information Disclosure via Improper Input Validation in Transaction class There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
Metadata
Created: 2022-05-24T17:32:47Z
Modified: 2023-08-07T19:59:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wpmr-q825-x4c6/GHSA-wpmr-q825-x4c6.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-wpmr-q825-x4c6
Finding: F310
Auto approve: 1