CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
40.5%
LuaTeX before 1.17.0 allows execution of arbitrary shell commands when
compiling a TeX file obtained from an untrusted source. This occurs because
luatex-core.lua lets the original io.popen be accessed. This also affects
TeX Live before 2023 r66984 and MiKTeX before 23.5.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | texlive-bin | < 2017.20170613.44572-8ubuntu0.2 | UNKNOWN |
ubuntu | 20.04 | noarch | texlive-bin | < 2019.20190605.51237-3ubuntu0.1 | UNKNOWN |
ubuntu | 22.04 | noarch | texlive-bin | < 2021.20210626.59705-1ubuntu0.1 | UNKNOWN |
ubuntu | 22.10 | noarch | texlive-bin | < 2022.20220321.62855-4ubuntu0.1 | UNKNOWN |
ubuntu | 23.04 | noarch | texlive-bin | < 2022.20220321.62855-5ubuntu0.1 | UNKNOWN |
github.com/TeX-Live/texlive-source/releases/tag/build-svn66984
gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0
launchpad.net/bugs/cve/CVE-2023-32700
nvd.nist.gov/vuln/detail/CVE-2023-32700
security-tracker.debian.org/tracker/CVE-2023-32700
tug.org/pipermail/tex-live/2023-May/049188.html
tug.org/~mseven/luatex.html
ubuntu.com/security/notices/USN-6115-1
www.cve.org/CVERecord?id=CVE-2023-32700