Privilege Escalation Vulnerability in apport

Privilege Escalation Vulnerability in apport

CVE-2019-11481 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

Learn more about our User Device Pen Test.