logo

CVE-2020-15703 aptdaemon

Package

Manager: pip
Name: aptdaemon
Vulnerable Version: >=0 <1.1.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00044 pctl0.12802

Details

aptdaemon Information Disclosure via Improper Input Validation in Transaction class There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

Metadata

Created: 2022-05-24T17:32:47Z
Modified: 2023-08-07T19:59:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-wpmr-q825-x4c6/GHSA-wpmr-q825-x4c6.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-wpmr-q825-x4c6
Finding: F310
Auto approve: 1