CVE-2023-2110

Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
References
Link Resource
https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ Release Notes
https://starlabs.sg/advisories/23/23-2110/ Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:obsidian:obsidian:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

24 Aug 2023, 14:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CWE CWE-22
References (MISC) https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ - (MISC) https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ - Release Notes
References (MISC) https://starlabs.sg/advisories/23/23-2110/ - (MISC) https://starlabs.sg/advisories/23/23-2110/ - Exploit, Mitigation, Third Party Advisory
First Time Linux
Microsoft
Apple
Obsidian
Apple macos
Obsidian obsidian
Linux linux Kernel
Microsoft windows
CPE cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:obsidian:obsidian:*:*:*:*:*:*:*:*

19 Aug 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-19 06:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-2110

Mitre link : CVE-2023-2110

CVE.ORG link : CVE-2023-2110


JSON object : View

Products Affected

apple

  • macos

microsoft

  • windows

linux

  • linux_kernel

obsidian

  • obsidian
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')