CVE-2024-23745

In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:notion:web_clipper:1.0.3\(7\):*:*:*:*:*:*:*

History

13 Mar 2024, 22:15

Type Values Removed Values Added
References
  • () https://blog.xpnsec.com/dirtynib/ -
  • () https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why-arent-physically_local-attacks-in-Chromes-threat-model -
Summary (en) In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. (en) In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS.

06 Feb 2024, 20:42

Type Values Removed Values Added
CPE cpe:2.3:a:notion:web_clipper:1.0.3\(7\):*:*:*:*:*:*:*
CWE CWE-77
First Time Notion web Clipper
Notion
References () https://github.com/louiselalanne/CVE-2024-23745 - () https://github.com/louiselalanne/CVE-2024-23745 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

31 Jan 2024, 14:05

Type Values Removed Values Added
Summary
  • (es) En Notion Web Clipper 1.0.3(7), un archivo .nib es susceptible al ataque Dirty NIB. Los archivos NIB se pueden manipular para ejecutar comandos arbitrarios. Además, incluso si un archivo NIB se modifica dentro de una aplicación, Gatekeeper aún puede permitir la ejecución de la aplicación, permitiendo la ejecución de comandos arbitrarios dentro del contexto de la aplicación.

31 Jan 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-31 02:15

Updated : 2024-04-11 01:24


NVD link : CVE-2024-23745

Mitre link : CVE-2024-23745

CVE.ORG link : CVE-2024-23745


JSON object : View

Products Affected

notion

  • web_clipper
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')