It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1917904 | vendor advisory exploit |