Untrusted Search Path Affecting utilities/kate package, versions [,21.12.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-UTILITIESKATE-2400715
  • published14 Feb 2022
  • disclosed14 Feb 2022
  • creditFabian Vogt

Introduced: 14 Feb 2022

CVE-2022-23853  (opens in a new tab)
CWE-426  (opens in a new tab)

How to fix?

Upgrade utilities/kate to version 21.12.2 or higher.

Overview

Affected versions of this package are vulnerable to Untrusted Search Path due to the way the application searches for executable files. Both KTextEditor and KDE Kate try to execute binaries (Kate - 'git', 'svn', and LSP binaries. KTextEditor - 'git') when opening a file of a given type. If this binary is absent from the PATH environment variable, it will try running the binary in the directory of the file that was just opened. This allows a local user to place a malicious binary file into a current working directory, run the application, and in turn the application will run his file with elevated privileges.

CVSS Scores

version 3.1