
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-28617 affects org-babel-execute:latex in ob-latex.el in Org Mode through version 9.6.1 for GNU Emacs. The vulnerability was discovered by Xi Lu and allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters (NVD).
The vulnerability exists in the org-babel-execute:latex function within ob-latex.el, where shell commands were used to move files without proper input sanitization. The issue has a CVSS v3.1 Base Score of 7.8 (HIGH) with vector CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating local access is required but no privileges are needed (NVD).
The vulnerability allows attackers to execute arbitrary shell commands through specially crafted file or directory names containing shell metacharacters, potentially leading to system compromise with the privileges of the Emacs process (Debian Security).
The vulnerability was fixed in Org Mode version 9.6.2 by replacing shell commands with the Emacs built-in rename-file function. Various distributions have released security updates: Debian 10 (version 1:26.1+1-3.2+deb10u4), Ubuntu (multiple versions), and Red Hat Enterprise Linux 8 (Debian Security, Org Mode Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."