CVE-2023-32700
texlive: arbitrary code execution allows document complied with older version
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
An arbitrary code execution vulnerability was found in LuaTeX (TeX Live) that allows any document compiled with older versions of LuaTeX to execute arbitrary shell commands, even with shell escape disabled.
Max Chernoff discovered that improperly secured shell-escape in LuaTeX may result in arbitrary shell command execution, even with shell escape disabled, if specially crafted tex files are processed.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-05-11 CVE Reserved
- 2023-05-20 CVE Published
- 2025-01-31 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://github.com/TeX-Live/texlive-source/releases/tag/build-svn66984 | Release Notes | |
https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0 | Release Notes | |
https://tug.org/pipermail/tex-live/2023-May/049188.html | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tug.org/~mseven/luatex.html | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Luatex Project Search vendor "Luatex Project" | Luatex Search vendor "Luatex Project" for product "Luatex" | >= 1.04 < 1.16.2 Search vendor "Luatex Project" for product "Luatex" and version " >= 1.04 < 1.16.2" | - |
Affected
| ||||||
Miktex Search vendor "Miktex" | Miktex Search vendor "Miktex" for product "Miktex" | >= 2.9.6300 < 23.5 Search vendor "Miktex" for product "Miktex" and version " >= 2.9.6300 < 23.5" | - |
Affected
| ||||||
Tug Search vendor "Tug" | Tex Live Search vendor "Tug" for product "Tex Live" | >= 2017 < 2023 Search vendor "Tug" for product "Tex Live" and version " >= 2017 < 2023" | - |
Affected
|