6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
32.4%
The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and
KTextEditor before 5.91.0 tries to execute the associated LSP server binary
when opening a file of a given type. If this binary is absent from the
PATH, it will try running the LSP server binary in the directory of the
file that was just opened (due to a misunderstanding of the QProcess API,
that was never intended). This can be an untrusted directory.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | kate | < any | UNKNOWN |
ubuntu | 20.04 | noarch | kate | < any | UNKNOWN |
ubuntu | 22.04 | noarch | kate | < any | UNKNOWN |
ubuntu | 23.10 | noarch | kate | < any | UNKNOWN |
ubuntu | 24.04 | noarch | kate | < any | UNKNOWN |
ubuntu | 16.04 | noarch | kate | < any | UNKNOWN |
ubuntu | 18.04 | noarch | ktexteditor | < any | UNKNOWN |
ubuntu | 20.04 | noarch | ktexteditor | < any | UNKNOWN |
ubuntu | 22.04 | noarch | ktexteditor | < any | UNKNOWN |
ubuntu | 23.10 | noarch | ktexteditor | < any | UNKNOWN |
apps.kde.org/kate/
commits.kde.org/kate/361dd43e42994829dbdb35e78fb7698d27cbb0e2
commits.kde.org/kate/6fc3bf6e5bd540e842e32c4a959c2158c8573be5
commits.kde.org/kate/92a9c65e30b4b63b8b116eb5c8dcb1e1a2d867bc
kde.org/info/security/advisory-20220131-1.txt
launchpad.net/bugs/cve/CVE-2022-23853
nvd.nist.gov/vuln/detail/CVE-2022-23853
security-tracker.debian.org/tracker/CVE-2022-23853
www.cve.org/CVERecord?id=CVE-2022-23853
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
32.4%