Description
It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4271 | It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2. |
Ubuntu USN |
USN-4424-1 | snapd vulnerabilities |
References
| Link | Providers |
|---|---|
| https://launchpad.net/bugs/1880085 |
|
| https://ubuntu.com/USN-4424-1 |
|
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T04:04:04.329Z
Reserved: 2020-04-20T00:00:00.000Z
Link: CVE-2020-11934
No data.
Status : Modified
Published: 2020-07-29T17:15:12.967
Modified: 2024-11-21T04:58:56.127
Link: CVE-2020-11934
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN