GHSA-564w-97r7-c6p9

Suggest an improvement
Source
https://github.com/advisories/GHSA-564w-97r7-c6p9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/06/GHSA-564w-97r7-c6p9/GHSA-564w-97r7-c6p9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-564w-97r7-c6p9
Aliases
Published
2023-06-21T22:07:37Z
Modified
2023-11-08T04:12:51.228074Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L CVSS Calculator
Summary
Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows
Details

On Windows, it is possible to open a livebook:// link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine.

Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser.

References

Affected packages

Hex / livebook

Package

Name
livebook
Purl
pkg:hex/livebook

Affected ranges

Type
SEMVER
Events
Introduced
0.8.0
Fixed
0.8.2

Hex / livebook

Package

Name
livebook
Purl
pkg:hex/livebook

Affected ranges

Type
SEMVER
Events
Introduced
0.9.0
Fixed
0.9.3