1 results (0.009 seconds)
CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

CVE-2023-35174 – Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows
https://notcve.org/view.php?id=CVE-2023-35174
22 Jun 2023 — Livebook is a web application for writing interactive and collaborative code notebooks. On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. This vulnerability has been fixed in version 0.8.2 and 0.9.3. • https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •