CVE-2020-13753
Advisory lineage Upstream: 0 Downstream: 16
Modified
Published: 14 Jul 2020, 13:07
Last modified:04 Aug 2024, 12:25
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
10 CRITICAL
v3.1 (nvd)
EPSS Score
1.22% LOW
1% probability 0.00%
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
14 Jul 2020, 13:07
Published
Vulnerability first disclosed
04 Aug 2024, 12:25
Last Modified
Vulnerability information updated
Description
The bubblewrap sandbox of WebKitGTK and WPE WebKit, prior to 2.28.3, failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg-desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal's input buffer, similar to CVE-2017-5226.
CVSS Metrics
- v3.1•CRITICAL•Score: 10CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- v2.0•HIGH•Score: 7.5AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Trends
Current EPSS score: 1.22%• Percentile: 79%
Techniques & Countermeasures
- CWE-20•Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Affected Systems
- canonical•ubuntu_linux
18.04 | 19.10 | 20.04
- debian•debian_linux
10.0
- fedoraproject•fedora
31
- opensuse•leap
15.1
- Unknown•WebKitGTK
< 2.28.3
- wpewebkit•wpe_webkit
< 2.28.3
References (7)
- https://trac.webkit.org/changeset/262368/webkit
- https://www.openwall.com/lists/oss-security/2020/07/10/1
- https://www.debian.org/security/2020/dsa-4724
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/
- https://usn.ubuntu.com/4422-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html
- https://security.gentoo.org/glsa/202007-11