CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
AI Score
Confidence
High
EPSS
Percentile
80.3%
It was discovered that Atril was vulnerable to a path traversal attack.
An attacker could possibly use this vulnerability to create arbitrary
files on the host filesystem with user privileges.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.10 | noarch | atril | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | atril-common | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | atril-dbgsym | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | gir1.2-atrildocument-1.5.0 | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | gir1.2-atrilview-1.5.0 | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | libatrildocument-dev | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | libatrildocument3 | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | libatrildocument3-dbgsym | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | libatrilview-dev | < 1.26.0-2ubuntu0.1 | UNKNOWN |
Ubuntu | 23.10 | noarch | libatrilview3 | < 1.26.0-2ubuntu0.1 | UNKNOWN |