CVE-2023-35174 – livebook
Package
Manager: erlang
Name: livebook
Vulnerable Version: >=0.8.0 <0.8.2 || >=0.9.0 <0.9.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00463 pctl0.6333
Details
Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser.
Metadata
Created: 2023-06-21T22:07:37Z
Modified: 2023-06-22T17:26:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-564w-97r7-c6p9/GHSA-564w-97r7-c6p9.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-564w-97r7-c6p9
Finding: F004
Auto approve: 1