CVE-2015-1327

Published at:
2019-04-22T16:29:00.833

Global infos:

Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfer. This could allow a malicious application using the DBUS API to export file:///etc/passwd which would then send a copy of that file to another app.

CVE Status: Modified

References:

  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    No CVSS data available

    Links:

    Exploit-db
    Github