OS Command Injection Affecting atril package, versions <1.26.1-4


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.13% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-ATRIL-6156006
  • published13 Jan 2024
  • disclosed12 Jan 2024

Introduced: 12 Jan 2024

CVE-2023-51698  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade Debian:unstable atril to version 1.26.1-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream atril package and not the atril package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.

CVSS Scores

version 3.1