CVE-2020-15703

Severity
3.3LOW
EPSS
0.0%
top 86.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 31
Latest updateMay 24

Description

There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.5 | Impact: 1.4

Affected Packages4 packages

PyPIaptdaemon< 1.1.1
CVEListV5canonical/aptdaemonunspecified1.1.1+bzr982-0ubuntu32.2+2
Ubuntuaptdaemon< 1.1.1+bzr982-0ubuntu14.4+2

Patches

🔴Vulnerability Details

4
GHSA
aptdaemon Information Disclosure via Improper Input Validation in Transaction class2022-05-24
OSV
aptdaemon Information Disclosure via Improper Input Validation in Transaction class2022-05-24
CVEList
aptdaemon allows unprivileged users to test for the presence of local files via the transaction Locale property2020-10-31
OSV
CVE-2020-15703: There is no input validation on the Locale property in an apt transaction2020-09-24

📋Vendor Advisories

1
Ubuntu
Aptdaemon vulnerability2020-09-24
CVE-2020-15703 (LOW CVSS 3.3) | There is no input validation on the | cvebase.io