{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1724","assignerOrgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","state":"PUBLISHED","assignerShortName":"canonical","dateReserved":"2024-02-21T19:46:47.236Z","datePublished":"2024-07-25T19:05:23.299Z","dateUpdated":"2024-08-01T18:48:21.887Z"},"containers":{"cna":{"title":"snapd allows $HOME/bin symlink","datePublic":"2024-03-13T08:27:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-732","description":"CWE-732 Incorrect Permission Assignment for Critical Resource","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-1","descriptions":[{"lang":"en","value":"CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"}]}],"affected":[{"vendor":"Canonical","product":"snap","platforms":["Linux"],"packageName":"snapd","repo":"https://github.com/snapcore/snapd/","modules":["Generated AppArmor policy"],"programFiles":["interfaces/builtin/home.go"],"programRoutines":[{"name":"homeConnectedPlugAppArmor"}],"versions":[{"status":"affected","version":"0","lessThan":"2.62","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"In snapd versions prior to 2.62, when using AppArmor for enforcement of \nsandbox permissions, snapd failed to restrict writes to the $HOME/bin\npath. In Ubuntu, when this path exists, it is automatically added to\nthe users PATH. An attacker who could convince a user to install a\nmalicious snap which used the 'home' plug could use this vulnerability\nto install arbitrary scripts into the users PATH which may then be run\nby the user outside of the expected snap sandbox and hence allow them\nto escape confinement."}],"references":[{"url":"https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6"},{"url":"https://gld.mcphail.uk/posts/explaining-cve-2024-1724/"},{"url":"https://github.com/snapcore/snapd/pull/13689"}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM"}}],"credits":[{"lang":"en","value":"Neil McPhail","type":"finder"}],"providerMetadata":{"orgId":"cc1ad9ee-3454-478d-9317-d3e869d708bc","shortName":"canonical","dateUpdated":"2024-07-25T19:13:07.140Z"}},"adp":[{"affected":[{"vendor":"canonical","product":"snapd","cpes":["cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"2.62","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-25T19:25:43.941220Z","id":"CVE-2024-1724","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-25T19:28:23.939Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:21.887Z"},"title":"CVE Program Container","references":[{"url":"https://github.com/snapcore/snapd/commit/aa191f97713de8dc3ce3ac818539f0b976eb8ef6","tags":["x_transferred"]},{"url":"https://gld.mcphail.uk/posts/explaining-cve-2024-1724/","tags":["x_transferred"]},{"url":"https://github.com/snapcore/snapd/pull/13689","tags":["x_transferred"]}]}]}}