CVE-2023-35174

Livebook is a web application for writing interactive and collaborative code notebooks. On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. This vulnerability has been fixed in version 0.8.2 and 0.9.3.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:livebook:livebook:*:*:*:*:*:*:*:*
cpe:2.3:a:livebook:livebook:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:08

Type Values Removed Values Added
References () https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1 - Patch () https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1 - Patch
References () https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8 - Patch () https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8 - Patch
References () https://github.com/livebook-dev/livebook/releases/tag/v0.8.2 - Release Notes () https://github.com/livebook-dev/livebook/releases/tag/v0.8.2 - Release Notes
References () https://github.com/livebook-dev/livebook/releases/tag/v0.9.3 - Release Notes () https://github.com/livebook-dev/livebook/releases/tag/v0.9.3 - Release Notes
References () https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9 - Vendor Advisory () https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9 - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.6

29 Jun 2023, 20:20

Type Values Removed Values Added
CPE cpe:2.3:a:livebook:livebook:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
First Time Livebook livebook
Microsoft
Livebook
Microsoft windows
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9 - (MISC) https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9 - Vendor Advisory
References (MISC) https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8 - (MISC) https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8 - Patch
References (MISC) https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1 - (MISC) https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1 - Patch
References (MISC) https://github.com/livebook-dev/livebook/releases/tag/v0.9.3 - (MISC) https://github.com/livebook-dev/livebook/releases/tag/v0.9.3 - Release Notes
References (MISC) https://github.com/livebook-dev/livebook/releases/tag/v0.8.2 - (MISC) https://github.com/livebook-dev/livebook/releases/tag/v0.8.2 - Release Notes

22 Jun 2023, 14:49

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 14:15

Updated : 2024-11-21 08:08


NVD link : CVE-2023-35174

Mitre link : CVE-2023-35174

CVE.ORG link : CVE-2023-35174


JSON object : View

Products Affected

livebook

  • livebook

microsoft

  • windows
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')