Lucene search

K
cve[email protected]CVE-2023-1350
HistoryMar 11, 2023 - 9:15 a.m.

CVE-2023-1350

2023-03-1109:15:10
CWE-78
web.nvd.nist.gov
22
cve-2023-1350
liferea
critical
vulnerability
command injection
update_job_run
feed enrichment
nvd
patch
vdb-222848

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%

A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date >/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848.

Affected configurations

Vulners
NVD
Node
liferealifereaMatch1.12.0
OR
liferealifereaMatch1.12.1
OR
liferealifereaMatch1.12.2
OR
liferealifereaMatch1.12.3
OR
liferealifereaMatch1.12.4
OR
liferealifereaMatch1.12.5
OR
liferealifereaMatch1.12.6
OR
liferealifereaMatch1.12.7
OR
liferealifereaMatch1.12.8
OR
liferealifereaMatch1.12.9
OR
liferealifereaMatch1.13.0
OR
liferealifereaMatch1.13.1
OR
liferealifereaMatch1.13.2
OR
liferealifereaMatch1.13.3
OR
liferealifereaMatch1.13.4
OR
liferealifereaMatch1.13.5
OR
liferealifereaMatch1.13.6
OR
liferealifereaMatch1.13.7
OR
liferealifereaMatch1.13.8
OR
liferealifereaMatch1.13.9
OR
liferealifereaMatch1.14rc1
OR
liferealifereaMatch1.14rc2
OR
liferealifereaMatch1.14rc3
OR
liferealifereaMatch1.14.0
VendorProductVersionCPE
liferealiferea1.12.0cpe:2.3:a:liferea:liferea:1.12.0:*:*:*:*:*:*:*
liferealiferea1.12.1cpe:2.3:a:liferea:liferea:1.12.1:*:*:*:*:*:*:*
liferealiferea1.12.2cpe:2.3:a:liferea:liferea:1.12.2:*:*:*:*:*:*:*
liferealiferea1.12.3cpe:2.3:a:liferea:liferea:1.12.3:*:*:*:*:*:*:*
liferealiferea1.12.4cpe:2.3:a:liferea:liferea:1.12.4:*:*:*:*:*:*:*
liferealiferea1.12.5cpe:2.3:a:liferea:liferea:1.12.5:*:*:*:*:*:*:*
liferealiferea1.12.6cpe:2.3:a:liferea:liferea:1.12.6:*:*:*:*:*:*:*
liferealiferea1.12.7cpe:2.3:a:liferea:liferea:1.12.7:*:*:*:*:*:*:*
liferealiferea1.12.8cpe:2.3:a:liferea:liferea:1.12.8:*:*:*:*:*:*:*
liferealiferea1.12.9cpe:2.3:a:liferea:liferea:1.12.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 241

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "liferea",
    "versions": [
      {
        "version": "1.12.0",
        "status": "affected"
      },
      {
        "version": "1.12.1",
        "status": "affected"
      },
      {
        "version": "1.12.2",
        "status": "affected"
      },
      {
        "version": "1.12.3",
        "status": "affected"
      },
      {
        "version": "1.12.4",
        "status": "affected"
      },
      {
        "version": "1.12.5",
        "status": "affected"
      },
      {
        "version": "1.12.6",
        "status": "affected"
      },
      {
        "version": "1.12.7",
        "status": "affected"
      },
      {
        "version": "1.12.8",
        "status": "affected"
      },
      {
        "version": "1.12.9",
        "status": "affected"
      },
      {
        "version": "1.13.0",
        "status": "affected"
      },
      {
        "version": "1.13.1",
        "status": "affected"
      },
      {
        "version": "1.13.2",
        "status": "affected"
      },
      {
        "version": "1.13.3",
        "status": "affected"
      },
      {
        "version": "1.13.4",
        "status": "affected"
      },
      {
        "version": "1.13.5",
        "status": "affected"
      },
      {
        "version": "1.13.6",
        "status": "affected"
      },
      {
        "version": "1.13.7",
        "status": "affected"
      },
      {
        "version": "1.13.8",
        "status": "affected"
      },
      {
        "version": "1.13.9",
        "status": "affected"
      },
      {
        "version": "1.14-RC1",
        "status": "affected"
      },
      {
        "version": "1.14-RC2",
        "status": "affected"
      },
      {
        "version": "1.14-RC3",
        "status": "affected"
      },
      {
        "version": "1.14.0",
        "status": "affected"
      }
    ],
    "modules": [
      "Feed Enrichment"
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.6 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%