Lucene search

K
cve[email protected]CVE-2023-1003
HistoryMar 07, 2023 - 8:15 p.m.

CVE-2023-1003

2023-03-0720:15:09
CWE-94
web.nvd.nist.gov
40
cve-2023-1003
typora
code injection
wsh jscript handler
vulnerability
nvd
security
upgrade

4.3 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.2%

A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736.

Affected configurations

Vulners
NVD
Node
typoratyporaMatch1.5.0
OR
typoratyporaMatch1.5.1
OR
typoratyporaMatch1.5.2
OR
typoratyporaMatch1.5.3
OR
typoratyporaMatch1.5.4
OR
typoratyporaMatch1.5.5
VendorProductVersionCPE
typoratypora1.5.0cpe:2.3:a:typora:typora:1.5.0:*:*:*:*:*:*:*
typoratypora1.5.1cpe:2.3:a:typora:typora:1.5.1:*:*:*:*:*:*:*
typoratypora1.5.2cpe:2.3:a:typora:typora:1.5.2:*:*:*:*:*:*:*
typoratypora1.5.3cpe:2.3:a:typora:typora:1.5.3:*:*:*:*:*:*:*
typoratypora1.5.4cpe:2.3:a:typora:typora:1.5.4:*:*:*:*:*:*:*
typoratypora1.5.5cpe:2.3:a:typora:typora:1.5.5:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Typora",
    "versions": [
      {
        "version": "1.5.0",
        "status": "affected"
      },
      {
        "version": "1.5.1",
        "status": "affected"
      },
      {
        "version": "1.5.2",
        "status": "affected"
      },
      {
        "version": "1.5.3",
        "status": "affected"
      },
      {
        "version": "1.5.4",
        "status": "affected"
      },
      {
        "version": "1.5.5",
        "status": "affected"
      }
    ],
    "modules": [
      "WSH JScript Handler"
    ]
  }
]

4.3 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.2%

Related for CVE-2023-1003