Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33631 | Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian. |
Mon, 07 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2024-10-07T20:02:00.230Z
Reserved: 2023-04-17T07:07:37.532Z
Link: CVE-2023-2110
Updated: 2024-08-02T06:12:20.430Z
Status : Modified
Published: 2023-08-19T06:15:45.613
Modified: 2024-11-21T07:57:57.580
Link: CVE-2023-2110
No data.
OpenCVE Enrichment
No data.
EUVD