Lucene search

K
cve[email protected]CVE-2023-2316
HistoryAug 19, 2023 - 6:15 a.m.

CVE-2023-2316

2023-08-1906:15:46
CWE-22
web.nvd.nist.gov
19
cve-2023-2316
typora
vulnerability
path handling
local files
exfiltration

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via “typora://app/<absolute-path>”.

This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

Affected configurations

NVD
Node
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
AND
typoratyporaRange<1.6.7
CPENameOperatorVersion
typora:typoratyporalt1.6.7

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux"
    ],
    "product": "Typora",
    "vendor": "Typora",
    "versions": [
      {
        "lessThan": "1.6.7",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Related for CVE-2023-2316