Lucene search

K
nvd[email protected]NVD:CVE-2023-2971
HistoryAug 19, 2023 - 6:15 a.m.

CVE-2023-2971

2023-08-1906:15:47
CWE-22
web.nvd.nist.gov
cve-2023-2971
improper path handling
crafted webpage
local files
exfiltration
remote web servers
exploitation
malicious markdown file
malicious webpage
typora

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via “typora://app/typemark/”. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.

Affected configurations

NVD
Node
typoratyporaRange1.6.7
AND
linuxlinux_kernelMatch-
OR
microsoftwindowsMatch-

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

37.0%

Related for NVD:CVE-2023-2971