CVE-2023-49345
Published: 14 December 2023
Temporary data passed between application components by Budgie Extras Takeabreak applet could potentially be viewed or manipulated. The data is stored in a location that is accessible to any user who has local access to the system. Attackers may pre-create and control this file to present false information to users or deny access to the application and panel.
From the Ubuntu Security Team
Matthias Gerstner discovered that the Takeabreak application of Budgie Extras used predictable temporary file paths which are world editable. An attacker could use this to inject false information, read information, or deny access to the application.
Notes
Author | Note |
---|---|
0xnishit | CWE-377, CWE-668 |
Priority
Status
Package | Release | Status |
---|---|---|
budgie-extras Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Needs triage
|
|
jammy |
Released
(1.4.0-1ubuntu3.1)
|
|
lunar |
Released
(1.6.0-1ubuntu0.1)
|
|
mantic |
Released
(1.7.0-3.0ubuntu1)
|
|
noble |
Needs triage
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(end of standard support)
|
|
Patches: upstream: https://github.com/UbuntuBudgie/budgie-extras/commit/ffa29d4bfe880217e28d99de99026760ae6fe1d4 upstream: https://github.com/UbuntuBudgie/budgie-extras/commit/45f1a54258aaaa27459b25f476d96ca5b1f2b25f upstream: https://github.com/UbuntuBudgie/budgie-extras/commit/c2889de3c02ce7e447bdf8efa569fe7b4fb641ca upstream: https://github.com/UbuntuBudgie/budgie-extras/commit/51258ac514c734fcf1cf832369277ff0794c38ca |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.0 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |