First published: Sat Aug 19 2023(Updated: )
Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
Credit: info@starlabs.sg info@starlabs.sg
Affected Software | Affected Version | How to fix |
---|---|---|
Obsidian Obsidian | <1.2.8 | |
Apple macOS | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2110 is a vulnerability in Obsidian desktop before version 1.2.8 that allows a crafted webpage to access local files and exfiltrate them to remote web servers.
CVE-2023-2110 affects Obsidian desktop versions before 1.2.8 on Windows, Linux, and macOS.
The severity of CVE-2023-2110 is high with a CVSS score of 7.1.
CVE-2023-2110 can be exploited if a user opens a malicious markdown file in Obsidian.
CVE-2023-2110 can be fixed by updating Obsidian desktop to version 1.2.8 or later.