Vulnerabilites related to ubports - ubuntu_touch
Vulnerability from fkie_nvd
Published
2022-09-09 00:15
Modified
2024-11-21 07:21
Severity ?
Summary
UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password. NOTE: a third party states "The described attack cannot be executed as demonstrated.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubports | ubuntu_touch | 16.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ubports:ubuntu_touch:16.04:*:*:*:*:*:*:*", "matchCriteriaId": "1F0A62E6-CA62-4B4B-9679-205D4E68847B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account\u0027s password. NOTE: a third party states \"The described attack cannot be executed as demonstrated." }, { "lang": "es", "value": "** EN DISPUTA ** UBports Ubuntu Touch versi\u00f3n 16.04, permite usar el c\u00f3digo de acceso de desbloqueo de pantalla para un shell privilegiado por medio de Sudo. Este c\u00f3digo de acceso es de s\u00f3lo cuatro d\u00edgitos, muy por debajo de la longitud/complejidad t\u00edpica para la contrase\u00f1a de una cuenta de usuario. NOTA: un tercero afirma \"El ataque descrito no puede ser ejecutado como se ha demostrado\"" } ], "id": "CVE-2022-40297", "lastModified": "2024-11-21T07:21:13.067", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-09T00:15:08.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-07 23:15
Modified
2024-11-21 02:04
Severity ?
5.9 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
signond_project | signond | * | |
ubports | ubuntu_touch | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:signond_project:signond:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3F079AB-3D0F-4A6A-B2A8-A875199B78A9", "versionEndExcluding": "8.57\\+15.04.20141127.1-0ubuntu1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ubports:ubuntu_touch:-:*:*:*:*:*:*:*", "matchCriteriaId": "5443E410-5EFD-4C9D-84E7-1EBE11780B52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information." }, { "lang": "es", "value": "signond versiones anteriores a 8.57+15.04.20141127.1-0ubuntu1, como es usado en Ubuntu Touch, no restringi\u00f3 apropiadamente las aplicaciones a partir de consultar los tokens oath debido a unas comprobaciones incorrectas y la falta de instalaci\u00f3n de la signon-apparmor-extension. Un atacante podr\u00eda usar esto para crear una aplicaci\u00f3n de clics maliciosos que recopile tokens oauth para otras aplicaciones, exponiendo informaci\u00f3n confidencial." } ], "id": "CVE-2014-1423", "lastModified": "2024-11-21T02:04:15.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "security@ubuntu.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-07T23:15:11.310", "references": [ { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" } ], "sourceIdentifier": "security@ubuntu.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "security@ubuntu.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2014-1423 (GCVE-0-2014-1423)
Vulnerability from cvelistv5
Published
2020-05-07 22:25
Modified
2024-09-16 23:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Summary
signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:42:35.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "signon", "vendor": "Ubuntu", "versions": [ { "lessThan": "8.57+15.04.20141127.1-0ubuntu1", "status": "affected", "version": "Ubuntu 15.04 signon", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Michael Zanetti" } ], "datePublic": "2014-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-07T22:25:16", "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" } ], "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" ], "discovery": "INTERNAL" }, "title": "Online Accounts Signon daemon gives out all oauth tokens to any app", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@ubuntu.com", "DATE_PUBLIC": "2014-11-14T00:00:00.000Z", "ID": "CVE-2014-1423", "STATE": "PUBLIC", "TITLE": "Online Accounts Signon daemon gives out all oauth tokens to any app" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "signon", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "Ubuntu 15.04 signon", "version_value": "8.57+15.04.20141127.1-0ubuntu1" } ] } } ] }, "vendor_name": "Ubuntu" } ] } }, "credit": [ { "lang": "eng", "value": "Michael Zanetti" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "signond before 8.57+15.04.20141127.1-0ubuntu1, as used in Ubuntu Touch, did not properly restrict applications from querying oath tokens due to incorrect checks and the missing installation of the signon-apparmor-extension. An attacker could use this create a malicious click app that collects oauth tokens for other applications, exposing sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522 Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644", "refsource": "MISC", "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644" }, { "name": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645", "refsource": "MISC", "url": "http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380", "refsource": "MISC", "url": "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" } ] }, "source": { "defect": [ "https://bugs.launchpad.net/ubuntu/+source/signon/+bug/1392380" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "assignerShortName": "canonical", "cveId": "CVE-2014-1423", "datePublished": "2020-05-07T22:25:16.912816Z", "dateReserved": "2014-01-13T00:00:00", "dateUpdated": "2024-09-16T23:55:55.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-40297 (GCVE-0-2022-40297)
Vulnerability from cvelistv5
Published
2022-09-08 23:38
Modified
2024-08-03 12:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account's password. NOTE: a third party states "The described attack cannot be executed as demonstrated.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2022-40297", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-03T15:03:45.445268Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-03T15:03:55.228Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-03T12:14:40.046Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account\u0027s password. NOTE: a third party states \"The described attack cannot be executed as demonstrated." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-28T23:21:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-40297", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** UBports Ubuntu Touch 16.04 allows the screen-unlock passcode to be used for a privileged shell via Sudo. This passcode is only four digits, far below typical length/complexity for a user account\u0027s password. NOTE: a third party states \"The described attack cannot be executed as demonstrated.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc", "refsource": "MISC", "url": "https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-40297", "datePublished": "2022-09-08T23:38:32", "dateReserved": "2022-09-08T00:00:00", "dateUpdated": "2024-08-03T12:14:40.046Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }