Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1xNDdwLXY1cnctdjU3NM4AA-FC
Ankitects Anki LaTeX Blocklist Bypass vulnerability
A blocklist bypass vulnerability exists in the LaTeX functionality of Ankitects Anki 24.04. A specially crafted malicious flashcard can lead to an arbitrary file creation at a fixed path. An attacker can share a malicious flashcard to trigger this vulnerability.
Permalink: https://github.com/advisories/GHSA-q47p-v5rw-v574JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xNDdwLXY1cnctdjU3NM4AA-FC
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 4 months ago
Updated: 4 months ago
CVSS Score: 3.1
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Identifiers: GHSA-q47p-v5rw-v574, CVE-2024-32152
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-32152
- https://talosintelligence.com/vulnerability_reports/TALOS-2024-1994
- https://github.com/ankitects/anki/pull/3218
- https://skerritt.blog/anki-0day
- https://skii.dev/anki-0day
- https://github.com/ankitects/anki/commit/06f7aa393d21d7d5dd8039e15d543b73c3346932
- https://github.com/advisories/GHSA-q47p-v5rw-v574
Blast Radius: 5.6
Affected Packages
pypi:anki
Dependent packages: 5Dependent repositories: 62
Downloads: 117,293 last month
Affected Version Ranges: < 24.6
Fixed in: 24.6
All affected versions: 2.1.24, 2.1.25, 2.1.26, 2.1.28, 2.1.29, 2.1.30, 2.1.31, 2.1.32, 2.1.33, 2.1.34, 2.1.35, 2.1.36, 2.1.37, 2.1.38, 2.1.39, 2.1.40, 2.1.41, 2.1.42, 2.1.43, 2.1.44, 2.1.45, 2.1.46, 2.1.47, 2.1.48, 2.1.49, 2.1.50, 2.1.51, 2.1.52, 2.1.53, 2.1.54, 2.1.55, 2.1.56, 2.1.57, 2.1.58, 2.1.59, 2.1.60, 2.1.61, 2.1.62, 2.1.63, 2.1.64, 2.1.65, 2.1.66, 23.10.1, 23.12.1, 24.4.1
All unaffected versions: 24.6.1, 24.6.2, 24.6.3