Livebook Desktop vulnerability (CVE-2023-35174) allows arbitrary code execution on Windows systems. Learn about impact, affected versions, and mitigation steps.
Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows.
Understanding CVE-2023-35174
Livebook is a web application that allows users to write interactive and collaborative code notebooks. This CVE pertains to a vulnerability in Livebook Desktop that can be exploited to execute arbitrary commands on Windows systems.
What is CVE-2023-35174?
This CVE involves the improper neutralization of special elements used in an OS command ('OS Command Injection') in Livebook Desktop's protocol handler, allowing threat actors to trigger arbitrary code execution on victim's machines.
The Impact of CVE-2023-35174
The impact of this vulnerability is rated as HIGH with a CVSS v3.1 base score of 8.6. It has a high integrity impact and can lead to unauthorized execution of commands on affected Windows systems.
Technical Details of CVE-2023-35174
This section provides technical details related to the vulnerability.
Vulnerability Description
On Windows, users can open a
livebook://
link from a browser, which triggers Livebook Desktop and allows attackers to execute arbitrary code on the victim's machine, potentially compromising system integrity.
Affected Systems and Versions
Livebook versions 0.8.0 to 0.8.2 and 0.9.0 to 0.9.3 are affected by this vulnerability, exposing Windows users to the risk of arbitrary code execution.
Exploitation Mechanism
Threat actors can exploit the Livebook Desktop's protocol handler to execute malicious commands on Windows systems, taking advantage of the OS Command Injection vulnerability.
Mitigation and Prevention
To address CVE-2023-35174 and enhance system security, users and organizations can take the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates