Skip to content

Potential manipulation of GUI displayed for budgie-extras budgie-dropby applet

Moderate
fossfreedom published GHSA-27g2-7x65-3cc5 Dec 14, 2023

Package

budgie-dropby (python)

Affected versions

> 1.4

Patched versions

v1.7.1

Description

Impact

Data used by the dropby applet is stored in a host system location that is accessible to any user who has local access to the system.

The data file format is easily guessable; this potentially allows a local attacker to pre-create this file and control whether to display or close the dropby window. This can confuse the end-user.

A denial-of-service will also be possible e.g. by placing a FIFO there. Since the applet runs in the same thread for the budgie panel, by crashing the applet this can crash the entire panel.

Patches

The fix has been resolved in a patch release v1.7.1

Workarounds

This issue can be mitigated if there is only one user account on the system and limiting physical access to other users to the host system.

References

None.

Severity

Moderate
5.2
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
Low
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L

CVE ID

CVE-2023-49343

Weaknesses

No CWEs

Credits