mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
20 lines
1.3 KiB
Markdown
20 lines
1.3 KiB
Markdown
![]() |
### [CVE-2023-50254](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50254)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Deepin Linux's default document reader `deepin-reader` software suffers from a serious vulnerability in versions prior to 6.0.7 due to a design flaw that leads to remote command execution via crafted docx document. This is a file overwrite vulnerability. Remote code execution (RCE) can be achieved by overwriting files like .bash_rc, .bash_login, etc. RCE will be triggered when the user opens the terminal. Version 6.0.7 contains a patch for the issue.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/linuxdeepin/developer-center/security/advisories/GHSA-q9jr-726g-9495
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/febinrev/deepin-linux_reader_RCE-exploit
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|