First published: Fri Jan 12 2024(Updated: )
Atril is a simple multi-page document viewer. Atril is vulnerable to a critical Command Injection Vulnerability. This vulnerability gives the attacker immediate access to the target system when the target user opens a crafted document or clicks on a crafted link/URL using a maliciously crafted CBT document which is a TAR archive. A patch is available at commit ce41df6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mate-desktop Atril | <=1.26.3 | |
debian/atril | 1.24.0-1+deb11u1 1.26.0-2+deb12u3 1.26.2-4 | |
debian/evince | 3.38.2-1 43.1-2 46.3.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-51698 is classified as a critical vulnerability due to its command injection risk.
To mitigate CVE-2023-51698, upgrade Atril to version 1.26.4 or higher.
CVE-2023-51698 affects systems running Atril versions up to 1.26.3.
Exploitation of CVE-2023-51698 allows attackers immediate access to the target system.
To prevent exploitation of CVE-2023-51698, avoid opening untrusted documents or links using Atril until updated.