Vulnerability Description
Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfer. This could allow a malicious application using the DBUS API to export file:///etc/passwd which would then send a copy of that file to another app.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 15.04 |
Related Weaknesses (CWE)
References
- https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212Third Party Advisory
- https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212Third Party Advisory
FAQ
What is CVE-2015-1327?
CVE-2015-1327 is a vulnerability with a CVSS score of 3.9 (LOW). Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfe...
How severe is CVE-2015-1327?
CVE-2015-1327 has been rated LOW with a CVSS base score of 3.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1327?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux.