CVE-2024-1724 (GCVE-0-2024-1724)
Vulnerability from cvelistv5 – Published: 2024-07-25 19:05 – Updated: 2024-08-01 18:48
VLAI?
Title
snapd allows $HOME/bin symlink
Summary
In snapd versions prior to 2.62, when using AppArmor for enforcement of
sandbox permissions, snapd failed to restrict writes to the $HOME/bin
path. In Ubuntu, when this path exists, it is automatically added to
the users PATH. An attacker who could convince a user to install a
malicious snap which used the 'home' plug could use this vulnerability
to install arbitrary scripts into the users PATH which may then be run
by the user outside of the expected snap sandbox and hence allow them
to escape confinement.
Severity ?
6.3 (Medium)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
Credits
Neil McPhail
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "snapd",
"vendor": "canonical",
"versions": [
{
"lessThan": "2.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1724",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-25T19:25:43.941220Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-25T19:28:23.939Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:48:21.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6"
},
{
"tags": [
"x_transferred"
],
"url": "https://gld.mcphail.uk/posts/explaining-cve-2024-1724/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/snapcore/snapd/pull/13689"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Generated AppArmor policy"
],
"packageName": "snapd",
"platforms": [
"Linux"
],
"product": "snap",
"programFiles": [
"interfaces/builtin/home.go"
],
"programRoutines": [
{
"name": "homeConnectedPlugAppArmor"
}
],
"repo": "https://github.com/snapcore/snapd/",
"vendor": "Canonical",
"versions": [
{
"lessThan": "2.62",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Neil McPhail"
}
],
"datePublic": "2024-03-13T08:27:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In snapd versions prior to 2.62, when using AppArmor for enforcement of \nsandbox permissions, snapd failed to restrict writes to the $HOME/bin\npath. In Ubuntu, when this path exists, it is automatically added to\nthe users PATH. An attacker who could convince a user to install a\nmalicious snap which used the \u0027home\u0027 plug could use this vulnerability\nto install arbitrary scripts into the users PATH which may then be run\nby the user outside of the expected snap sandbox and hence allow them\nto escape confinement."
}
],
"impacts": [
{
"capecId": "CAPEC-1",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-25T19:13:07.140Z",
"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"shortName": "canonical"
},
"references": [
{
"url": "https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6"
},
{
"url": "https://gld.mcphail.uk/posts/explaining-cve-2024-1724/"
},
{
"url": "https://github.com/snapcore/snapd/pull/13689"
}
],
"title": "snapd allows $HOME/bin symlink"
}
},
"cveMetadata": {
"assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
"assignerShortName": "canonical",
"cveId": "CVE-2024-1724",
"datePublished": "2024-07-25T19:05:23.299Z",
"dateReserved": "2024-02-21T19:46:47.236Z",
"dateUpdated": "2024-08-01T18:48:21.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://gld.mcphail.uk/posts/explaining-cve-2024-1724/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/snapcore/snapd/pull/13689\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T18:48:21.887Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-1724\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-25T19:25:43.941220Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*\"], \"vendor\": \"canonical\", \"product\": \"snapd\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.62\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-25T19:26:35.668Z\"}}], \"cna\": {\"title\": \"snapd allows $HOME/bin symlink\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Neil McPhail\"}], \"impacts\": [{\"capecId\": \"CAPEC-1\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"repo\": \"https://github.com/snapcore/snapd/\", \"vendor\": \"Canonical\", \"modules\": [\"Generated AppArmor policy\"], \"product\": \"snap\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.62\", \"versionType\": \"custom\"}], \"platforms\": [\"Linux\"], \"packageName\": \"snapd\", \"programFiles\": [\"interfaces/builtin/home.go\"], \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"homeConnectedPlugAppArmor\"}]}], \"datePublic\": \"2024-03-13T08:27:00.000Z\", \"references\": [{\"url\": \"https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6\"}, {\"url\": \"https://gld.mcphail.uk/posts/explaining-cve-2024-1724/\"}, {\"url\": \"https://github.com/snapcore/snapd/pull/13689\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In snapd versions prior to 2.62, when using AppArmor for enforcement of \\nsandbox permissions, snapd failed to restrict writes to the $HOME/bin\\npath. In Ubuntu, when this path exists, it is automatically added to\\nthe users PATH. An attacker who could convince a user to install a\\nmalicious snap which used the \u0027home\u0027 plug could use this vulnerability\\nto install arbitrary scripts into the users PATH which may then be run\\nby the user outside of the expected snap sandbox and hence allow them\\nto escape confinement.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-732\", \"description\": \"CWE-732 Incorrect Permission Assignment for Critical Resource\"}]}], \"providerMetadata\": {\"orgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"shortName\": \"canonical\", \"dateUpdated\": \"2024-07-25T19:13:07.140Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-1724\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T18:48:21.887Z\", \"dateReserved\": \"2024-02-21T19:46:47.236Z\", \"assignerOrgId\": \"cc1ad9ee-3454-478d-9317-d3e869d708bc\", \"datePublished\": \"2024-07-25T19:05:23.299Z\", \"assignerShortName\": \"canonical\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…