Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-22970: [Security]: Vulnerability Patched in 51.0 · Issue #2463 · bottlesdevs/Bottles

Bottles before 51.0 mishandles YAML load, which allows remote code execution via a crafted file.

CVE
#vulnerability#rce

Overview

A security vulnerability has been discovered and addressed in bottlesdevs/Bottles.
Versions 50.2 and earlier are affected.
Please update Bottles to version 51.0 or later.

Am I affected

You may be impacted by malicious activity when processing files that contain a malicious YAML file.
This applies to the average user, who could potentially:

  • Importing a malicious bottle archive file
  • Creating a bottle using a malicious custom environment recipe
  • Loading a malicious local repository

What should I do

  1. Update to fixed version
  2. Scan your system if you have ever imported any untrusted file
  3. If you are using the official flatpak version, the impact of the vulnerability is significantly reduced due to the sandboxing provided by flatpak. However, it is still crucial to update Bottles to the latest version

Technical Detail

The vulnerability arises from multiple potential exploitation vectors related to the YAML load function.
The most probable method of exploitation is through the importation of a carefully crafted YAML file. This file can take the form of an archive tarball, a YAML configuration file, or a custom environment recipe.
Additionally, there is a risk of remote code execution when an attacker gains control over the repository mirror.

CVE

https://www.cve.org/CVERecord?id=CVE-2023-22970

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907