CVE-2023-35174: Livebook Desktop's protocol handler can be exploited to execute arbitrary command on Windows

8.6 CVSS

Description

Livebook is a web application for writing interactive and collaborative code notebooks. On Windows, it is possible to open a `livebook://` link from a browser which opens Livebook Desktop and triggers arbitrary code execution on victim's machine. Any user using Livebook Desktop on Windows is potentially vulnerable to arbitrary code execution when they expect Livebook to be opened from browser. This vulnerability has been fixed in version 0.8.2 and 0.9.3.

Classification

CVE ID: CVE-2023-35174

CVSS Base Severity: HIGH

CVSS Base Score: 8.6

Affected Products

Vendor: livebook-dev

Product: livebook

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.45% (probability of being exploited)

EPSS Percentile: 75.15% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/livebook-dev/livebook/security/advisories/GHSA-564w-97r7-c6p9
https://github.com/livebook-dev/livebook/commit/2e11b59f677c6ed3b6aa82dad412a8b3406ffdf1
https://github.com/livebook-dev/livebook/commit/beb10daaadcc765f0380e436bd7cd5f74cf086c8
https://github.com/livebook-dev/livebook/releases/tag/v0.8.2
https://github.com/livebook-dev/livebook/releases/tag/v0.9.3

Timeline