CVE-2023-28371
NixOS vulnerability analysis and mitigation

Overview

CVE-2023-28371 affects Stellarium through version 1.2, a real-time 3D photo-realistic nightsky renderer. The vulnerability was disclosed on March 15, 2023, and allows attackers to write to files that are typically unintended, such as ones with absolute pathnames or through directory traversal (NVD).

Technical details

The vulnerability is classified as an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') issue (CWE-22). It received a CVSS v3.1 Base Score of 9.8 CRITICAL with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a critical severity level with network access vector, low attack complexity, and no required privileges or user interaction (NVD).

Impact

The vulnerability allows attackers to write to unintended files through absolute pathnames or directory traversal, potentially leading to unauthorized file modifications and system compromise. This could affect system integrity and potentially lead to unauthorized access to sensitive files (NVD).

Mitigation and workarounds

Multiple security patches have been implemented to address this vulnerability. These include requiring manually set flags to run scripts from absolute pathnames, preventing overwriting of config.ini, and implementing checks for directory traversal attempts. The fixes are available in updated versions of Stellarium, and configuration options have been added to control file write permissions through the flags 'flagscriptallowabsolutepath' and 'flagscriptallowwriteabsolute_path' (Stellarium Commit, Stellarium Commit).

Community reactions

The vulnerability was addressed in Fedora Linux distributions with security updates released for Fedora 36, 37, and 38, indicating the broader impact on Linux distributions and the response from the open-source community (Fedora Update).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management