mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-29 05:56:17 +00:00
40 lines
1.4 KiB
JSON
40 lines
1.4 KiB
JSON
{
|
|
"id": "CVE-2020-17354",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2023-04-15T22:15:06.913",
|
|
"lastModified": "2023-04-17T13:12:43.170",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "http://lilypond.org/doc/v2.18/Documentation/usage/command_002dline-usage",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://gitlab.com/lilypond/lilypond/-/merge_requests/1522",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://lilypond.org/download.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://phabricator.wikimedia.org/T259210",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://tracker.debian.org/news/1249694/accepted-lilypond-2221-1-source-into-unstable/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.mediawiki.org/wiki/Extension:Score/2021_security_advisory",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |