NA

CVE-2023-51698

Published: 12/01/2024 Updated: 09/02/2024
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mate-desktop atril

Vendor Advisories

Debian Bug report logs - #1060751 atril: CVE-2023-51698 Package: src:atril; Maintainer for src:atril is Debian+Ubuntu MATE Packaging Team <debian-mate@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 13 Jan 2024 16:39:02 UTC Severity: grave Tags: security, upstream Found in version ...
Atril is a simple multi-page document viewer Atril is vulnerable to a critical Command Injection Vulnerability This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive A patch is availab ...

Github Repositories

CVE-2023-44452, CVE-2023-51698: CBT File Parsing Argument Injection that affected Popular Linux Distros

CVE-2023-44452, CVE-2023-51698: Linux Mint Xreader/MATE Atril CBT File Parsing Argument Injection Remote Code Execution Vulnerability A Critical One-Click RCE/Command Injection Vulnerability Affecting Popular Linux Operating Systems with MATE, Cinnamon, and some Xfce desktop Environments Affected Operating Systems: Linux Mint Kali Linux (Popular OS among Security professional