You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows
High
josevalim
published
GHSA-564w-97r7-c6p9Jun 21, 2023
Package
No package listed
Affected versions
0.8.0, 0.8.1, 0.9.0, 0.9.1, 0.9.2
Patched versions
0.8.2, 0.9.3
Description
On Windows, it is possible to open a livebook:// link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine.
Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser.
On Windows, it is possible to open a
livebook://
link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine.Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser.