René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

40 lines
1.4 KiB
JSON

{
"id": "CVE-2020-17354",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-15T22:15:06.913",
"lastModified": "2023-04-17T13:12:43.170",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used."
}
],
"metrics": {},
"references": [
{
"url": "http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.com/lilypond/lilypond/-/merge_requests/1522",
"source": "cve@mitre.org"
},
{
"url": "https://lilypond.org/download.html",
"source": "cve@mitre.org"
},
{
"url": "https://phabricator.wikimedia.org/T259210",
"source": "cve@mitre.org"
},
{
"url": "https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-source-into-unstable/",
"source": "cve@mitre.org"
},
{
"url": "https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory",
"source": "cve@mitre.org"
}
]
}