An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://ubuntu.com/security/notices/USN-5077-1 | vendor advisory |
https://ubuntu.com/security/notices/USN-5077-2 | vendor advisory |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710 | third party advisory |
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 | exploit vendor advisory |