Lucene search

K
cve[email protected]CVE-2023-2971
HistoryAug 19, 2023 - 6:15 a.m.

CVE-2023-2971

2023-08-1906:15:47
CWE-22
web.nvd.nist.gov
22
cve-2023-2971
typora
vulnerability
path handling
local file access
data exfiltration
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via “typora://app/typemark/”. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

Affected configurations

NVD
Node
typoratyporaRange1.6.7
AND
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-
CPENameOperatorVersion
typora:typoratyporale1.6.7

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux"
    ],
    "product": "Typora",
    "vendor": "Typora",
    "versions": [
      {
        "lessThan": "1.7.0-dev",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Related for CVE-2023-2971