CVE-2019-11481Link Following in Apport

CWE-59Link Following12 documents5 sources
Severity
7.8HIGHNVD
CNA3.8
EPSS
0.1%
top 67.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateMay 24

Description

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5canonical/apport2.14.12.14.1-0ubuntu3.29+esm2+3
Ubuntuapport_project/apport< 2.20.1-0ubuntu2.20+10

Also affects: Ubuntu Linux 14.04, 16.04, 18.04, 19.04, 19.10

🔴Vulnerability Details

9
GHSA
GHSA-7hrm-rprg-v656: Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges2022-05-24
OSV
apport regression2020-11-12
OSV
apport regression2020-03-18
CVEList
Apport reads arbitrary files if ~/.config/apport/settings is a symlink2020-02-08
OSV
apport regression2019-11-05

📋Vendor Advisories

2
Ubuntu
Apport vulnerabilities2019-11-04
Ubuntu
Apport vulnerabilities2019-10-30
CVE-2019-11481 — Link Following in Canonical Apport | cvebase