diff --git a/2020/11xxx/CVE-2020-11933.json b/2020/11xxx/CVE-2020-11933.json index 05fb12f47f4..45a209e8e23 100644 --- a/2020/11xxx/CVE-2020-11933.json +++ b/2020/11xxx/CVE-2020-11933.json @@ -1,18 +1,122 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "", + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2020-05-19T16:34:00.000Z", "ID": "CVE-2020-11933", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "local snapd exploit through cloud-init" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "snapd", + "version": { + "version_data": [ + { + "platform": "", + "version_affected": "<", + "version_name": "2.45.2", + "version_value": "2.45.2, revision 8539" + } + ] + } + }, + { + "product_name": "core", + "version": { + "version_data": [ + { + "platform": "", + "version_affected": "<", + "version_name": "2.45.2", + "version_value": "2.45.2, revision 9659" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "configuration": [], + "credit": [ + { + "lang": "eng", + "value": "Ian Johnson" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659." } ] - } -} \ No newline at end of file + }, + "exploit": [], + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-264 Permissions, Privileges, and Access Controls" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://launchpad.net/bugs/1879530", + "refsource": "CONFIRM", + "url": "https://launchpad.net/bugs/1879530" + }, + { + "name": "https://ubuntu.com/USN-4424-1", + "refsource": "CONFIRM", + "url": "https://ubuntu.com/USN-4424-1" + } + ] + }, + "solution": [], + "source": { + "advisory": "https://ubuntu.com/USN-4424-1", + "defect": [ + "https://launchpad.net/bugs/1879530" + ], + "discovery": "INTERNAL" + }, + "work_around": [] +} diff --git a/2020/11xxx/CVE-2020-11934.json b/2020/11xxx/CVE-2020-11934.json index 059bfe7a5ee..ae1d26f3294 100644 --- a/2020/11xxx/CVE-2020-11934.json +++ b/2020/11xxx/CVE-2020-11934.json @@ -1,18 +1,121 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "AKA": "", + "ASSIGNER": "security@ubuntu.com", + "DATE_PUBLIC": "2020-05-22T05:55:00.000Z", "ID": "CVE-2020-11934", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "Sandbox escape vulnerability via snapctl user-open (xdg-open)" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "snapd", + "version": { + "version_data": [ + { + "platform": "", + "version_affected": "<", + "version_name": "2.45.1", + "version_value": "2.45.1ubuntu0.2" + }, + { + "platform": "", + "version_affected": "<", + "version_name": "2.45.1", + "version_value": "2.45.1+18.04.2" + }, + { + "platform": "", + "version_affected": "<", + "version_name": "2.45.1", + "version_value": "2.45.1+20.04.2" + } + ] + } + } + ] + }, + "vendor_name": "Canonical" + } + ] + } + }, + "configuration": [], + "credit": [ + { + "lang": "eng", + "value": "James Henstridge" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2." } ] - } -} \ No newline at end of file + }, + "exploit": [], + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Sandbox escape vulnerability" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://launchpad.net/bugs/1880085", + "refsource": "CONFIRM", + "url": "https://launchpad.net/bugs/1880085" + }, + { + "name": "https://ubuntu.com/USN-4424-1", + "refsource": "CONFIRM", + "url": "https://ubuntu.com/USN-4424-1" + } + ] + }, + "solution": [], + "source": { + "advisory": "https://ubuntu.com/USN-4424-1", + "defect": [ + "https://launchpad.net/bugs/1880085" + ], + "discovery": "INTERNAL" + }, + "work_around": [] +}