In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS.
References
Configurations
History
13 Mar 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS. |
06 Feb 2024, 20:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Notion
Notion web Clipper |
|
CPE | cpe:2.3:a:notion:web_clipper:1.0.3\(7\):*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/louiselalanne/CVE-2024-23745 - Exploit, Third Party Advisory | |
CWE | CWE-77 |
31 Jan 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-31 02:15
Updated : 2024-08-01 23:15
NVD link : CVE-2024-23745
Mitre link : CVE-2024-23745
CVE.ORG link : CVE-2024-23745
JSON object : View
Products Affected
notion
- web_clipper
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')