CVE-2023-52076

Atril Document Viewer is the default document reader of the MATE desktop environment for Linux. A path traversal and arbitrary file write vulnerability exists in versions of Atril prior to 1.26.2. This vulnerability is capable of writing arbitrary files anywhere on the filesystem to which the user opening a crafted document has access. The only limitation is that this vulnerability cannot be exploited to overwrite existing files, but that doesn't stop an attacker from achieving Remote Command Execution on the target system. Version 1.26.2 of Atril contains a patch for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mate-desktop:atril:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 8.5
References () https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50 - Patch () https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50 - Patch
References () https://github.com/mate-desktop/atril/releases/tag/v1.26.2 - Release Notes () https://github.com/mate-desktop/atril/releases/tag/v1.26.2 - Release Notes
References () https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 - Exploit, Vendor Advisory () https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 - Exploit, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html -

15 Jun 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00003.html -

02 Feb 2024, 17:14

Type Values Removed Values Added
First Time Mate-desktop atril
Mate-desktop
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:mate-desktop:atril:*:*:*:*:*:*:*:*
CWE CWE-24
CWE-27
CWE-25
References () https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 - () https://github.com/mate-desktop/atril/security/advisories/GHSA-6mf6-mxpc-jc37 - Exploit, Vendor Advisory
References () https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50 - () https://github.com/mate-desktop/atril/commit/e70b21c815418a1e6ebedf6d8d31b8477c03ba50 - Patch
References () https://github.com/mate-desktop/atril/releases/tag/v1.26.2 - () https://github.com/mate-desktop/atril/releases/tag/v1.26.2 - Release Notes

25 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-25 16:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52076

Mitre link : CVE-2023-52076

CVE.ORG link : CVE-2023-52076


JSON object : View

Products Affected

mate-desktop

  • atril
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-24

Path Traversal: '../filedir'

CWE-25

Path Traversal: '/../filedir'

CWE-27

Path Traversal: 'dir/../../filename'