It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.
Published 2020-07-29 17:15:13
Updated 2020-08-05 18:46:07
View at NVD,   CVE.org

Products affected by CVE-2020-11934

Exploit prediction scoring system (EPSS) score for CVE-2020-11934

0.04%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2020-11934

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
1.9
LOW AV:L/AC:M/Au:N/C:N/I:P/A:N
3.4
2.9
NIST
5.9
MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
1.5
4.0
NIST
5.9
MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N
1.5
4.0
Canonical Ltd.

CWE ids for CVE-2020-11934

References for CVE-2020-11934

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!