CVE-2023-2971
Typora Local File Disclosure
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
El manejo inadecuado de rutas en Typora antes de 1.7.0-dev en Windows y Linux permite que una página web manipulada acceda a archivos locales y los exfiltre a servidores web remotos a través de "typora://app/typemark/". Esta vulnerabilidad puede ser explotada si un usuario abre un archivo markdown malicioso en Typora o copia texto de una página web y lo pega en Typora.
*Credits:
Li Jiantao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-05-30 CVE Reserved
- 2023-08-19 CVE Published
- 2024-10-07 CVE Updated
- 2024-10-07 First Exploit
- 2025-01-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
- CAPEC-139: Relative Path Traversal
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://starlabs.sg/advisories/23/23-2971 | 2024-10-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Typora Search vendor "Typora" | Typora Search vendor "Typora" for product "Typora" | <= 1.6.7 Search vendor "Typora" for product "Typora" and version " <= 1.6.7" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Typora Search vendor "Typora" | Typora Search vendor "Typora" for product "Typora" | <= 1.6.7 Search vendor "Typora" for product "Typora" and version " <= 1.6.7" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|