Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
References
Link | Resource |
---|---|
https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ | Release Notes |
https://starlabs.sg/advisories/23/23-2110/ | Exploit Mitigation Third Party Advisory |
https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ | Release Notes |
https://starlabs.sg/advisories/23/23-2110/ | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
References | () https://obsidian.md/changelog/2023-05-03-desktop-v1.2.8/ - Release Notes | |
References | () https://starlabs.sg/advisories/23/23-2110/ - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2023-08-19 06:15
Updated : 2024-11-21 07:57
NVD link : CVE-2023-2110
Mitre link : CVE-2023-2110
CVE.ORG link : CVE-2023-2110
JSON object : View
Products Affected
apple
- macos
linux
- linux_kernel
obsidian
- obsidian
microsoft
- windows
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')