Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfer. This could allow a malicious application using the DBUS API to export file:///etc/passwd which would then send a copy of that file to another app.
                
            References
                    | Link | Resource | 
|---|---|
| https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212 | Third Party Advisory | 
| https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:25
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bazaar.launchpad.net/~phablet-team/content-hub/trunk/revision/212 - Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : 4.3 v3 : 3.9 | 
Information
                Published : 2019-04-22 16:29
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1327
Mitre link : CVE-2015-1327
CVE.ORG link : CVE-2015-1327
JSON object : View
Products Affected
                canonical
- ubuntu_linux
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
