CVE-2020-13753

Modified
Published: 14 Jul 2020, 13:07
Last modified:04 Aug 2024, 12:25

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
10 CRITICAL
v3.1 (nvd)
EPSS Score
1.22% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

14 Jul 2020, 13:07
Published
Vulnerability first disclosed
04 Aug 2024, 12:25
Last Modified
Vulnerability information updated

Description

The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.

CVSS Metrics

  • v3.1CRITICALScore: 10CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • v2.0HIGHScore: 7.5AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Trends

Current EPSS score: 1.22% Percentile: 79%

Techniques & Countermeasures

  • CWE-20Improper Input Validation

    The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Affected Systems

  • canonicalubuntu_linux

    18.04 | 19.10 | 20.04

  • debiandebian_linux

    10.0

  • fedoraprojectfedora

    31

  • opensuseleap

    15.1

  • UnknownWebKitGTK

    < 2.28.3

  • wpewebkitwpe_webkit

    < 2.28.3

References (7)