CVE-2023-32700

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-32700
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32700.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-32700
Related
Published
2023-05-20T18:15:09Z
Modified
2025-01-31T17:47:46.941799Z
Downstream
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.

References

Affected packages

Debian:11 / texlive-bin

Package

Name
texlive-bin
Purl
pkg:deb/debian/texlive-bin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2020.20200327.54578-7+deb11u1

Affected versions

2020.*

2020.20200327.54578-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / texlive-bin

Package

Name
texlive-bin
Purl
pkg:deb/debian/texlive-bin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2022.20220321.62855-5.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / texlive-bin

Package

Name
texlive-bin
Purl
pkg:deb/debian/texlive-bin?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2022.20220321.62855-5.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}