Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows
High severity
GitHub Reviewed
Published
Jun 21, 2023
in
livebook-dev/livebook
•
Updated Nov 11, 2023
Package
Affected versions
>= 0.8.0, < 0.8.2
>= 0.9.0, < 0.9.3
Patched versions
0.8.2
0.9.3
Description
Published to the GitHub Advisory Database
Jun 21, 2023
Reviewed
Jun 21, 2023
Published by the National Vulnerability Database
Jun 22, 2023
Last updated
Nov 11, 2023
On Windows, it is possible to open a
livebook://
link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine.Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser.
References