CVE-2015-1327

EUVD-2015-1467
Content Hub before version 0.0+15.04.20150331-0ubuntu1.0 DBUS API only requires a file path for a content item, it doesn't actually require the confined app have access to the file to create a transfer. This could allow a malicious application using the DBUS API to export file:///etc/passwd which would then send a copy of that file to another app.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.9 LOW
PHYSICAL
HIGH
LOW
CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
canonicalCNA
3.9 LOW
PHYSICAL
HIGH
LOW
CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_linux
15.04
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
content-hub
precise
dne
trusty
dne
utopic
not-affected
vivid
Fixed 0.0+15.04.20150331-0ubuntu1.0
released
wily
ignored
xenial
not-affected
yakkety
not-affected
Common Weakness Enumeration