CVE-2015-1327

Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfer. This could allow a malicious application using the DBUS API to export file:///etc/passwd which would then send a copy of that file to another app.
Configurations

Configuration 1 (hide)

cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 7.8
v2 : 4.3
v3 : 3.9
References () https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212 - Third Party Advisory () https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212 - Third Party Advisory

Information

Published : 2019-04-22 16:29

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1327

Mitre link : CVE-2015-1327

CVE.ORG link : CVE-2015-1327


JSON object : View

Products Affected

canonical

  • ubuntu_linux
CWE
CWE-264

Permissions, Privileges, and Access Controls