CVE Vulnerabilities

CVE-2021-3709

Insertion of Sensitive Information into Externally-Accessible File or Directory

Published: Oct 01, 2021 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;

Weakness

The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.

Affected Software

NameVendorStart VersionEnd Version
ApportCanonical2.14.1-0ubuntu1 (including)2.14.1-0ubuntu1 (including)
ApportCanonical2.14.1-0ubuntu2 (including)2.14.1-0ubuntu2 (including)
ApportCanonical2.14.1-0ubuntu3 (including)2.14.1-0ubuntu3 (including)
ApportCanonical2.14.1-0ubuntu3.1 (including)2.14.1-0ubuntu3.1 (including)
ApportCanonical2.14.1-0ubuntu3.2 (including)2.14.1-0ubuntu3.2 (including)
ApportCanonical2.14.1-0ubuntu3.3 (including)2.14.1-0ubuntu3.3 (including)
ApportCanonical2.14.1-0ubuntu3.4 (including)2.14.1-0ubuntu3.4 (including)
ApportCanonical2.14.1-0ubuntu3.5 (including)2.14.1-0ubuntu3.5 (including)
ApportCanonical2.14.1-0ubuntu3.6 (including)2.14.1-0ubuntu3.6 (including)
ApportCanonical2.14.1-0ubuntu3.7 (including)2.14.1-0ubuntu3.7 (including)
ApportCanonical2.14.1-0ubuntu3.8 (including)2.14.1-0ubuntu3.8 (including)
ApportCanonical2.14.1-0ubuntu3.9 (including)2.14.1-0ubuntu3.9 (including)
ApportCanonical2.14.1-0ubuntu3.10 (including)2.14.1-0ubuntu3.10 (including)
ApportCanonical2.14.1-0ubuntu3.11 (including)2.14.1-0ubuntu3.11 (including)
ApportCanonical2.14.1-0ubuntu3.12 (including)2.14.1-0ubuntu3.12 (including)
ApportCanonical2.14.1-0ubuntu3.13 (including)2.14.1-0ubuntu3.13 (including)
ApportCanonical2.14.1-0ubuntu3.14 (including)2.14.1-0ubuntu3.14 (including)
ApportCanonical2.14.1-0ubuntu3.15 (including)2.14.1-0ubuntu3.15 (including)
ApportCanonical2.14.1-0ubuntu3.16 (including)2.14.1-0ubuntu3.16 (including)
ApportCanonical2.14.1-0ubuntu3.17 (including)2.14.1-0ubuntu3.17 (including)
ApportCanonical2.14.1-0ubuntu3.18 (including)2.14.1-0ubuntu3.18 (including)
ApportCanonical2.14.1-0ubuntu3.19 (including)2.14.1-0ubuntu3.19 (including)
ApportCanonical2.14.1-0ubuntu3.20 (including)2.14.1-0ubuntu3.20 (including)
ApportCanonical2.14.1-0ubuntu3.21 (including)2.14.1-0ubuntu3.21 (including)
ApportCanonical2.14.1-0ubuntu3.23 (including)2.14.1-0ubuntu3.23 (including)
ApportCanonical2.14.1-0ubuntu3.24 (including)2.14.1-0ubuntu3.24 (including)
ApportCanonical2.14.1-0ubuntu3.25 (including)2.14.1-0ubuntu3.25 (including)
ApportCanonical2.14.1-0ubuntu3.27 (including)2.14.1-0ubuntu3.27 (including)
ApportCanonical2.14.1-0ubuntu3.28 (including)2.14.1-0ubuntu3.28 (including)
ApportCanonical2.14.1-0ubuntu3.29 (including)2.14.1-0ubuntu3.29 (including)
ApportCanonical2.14.1-0ubuntu3.29+esm7 (including)2.14.1-0ubuntu3.29+esm7 (including)
ApportUbuntubionic*
ApportUbuntudevel*
ApportUbuntuesm-infra-legacy/trusty*
ApportUbuntuesm-infra/bionic*
ApportUbuntuesm-infra/focal*
ApportUbuntuesm-infra/xenial*
ApportUbuntufocal*
ApportUbuntuhirsute*
ApportUbuntuimpish*
ApportUbuntujammy*
ApportUbuntutrusty*
ApportUbuntutrusty/esm*
ApportUbuntuxenial*

Potential Mitigations

References