Remote Code Execution Vulnerability in Ashlar-Vellum Lithium
CVE-2023-44440
7.8HIGH
Key Information:
- Vendor
- Ashlar-vellum
- Status
- Lithium
- Vendor
- CVE Published:
- 3 May 2024
Summary
The Ashlar-Vellum Lithium software is susceptible to a vulnerability that allows remote code execution via an uncontrolled search path element. This flaw is triggered when the application parses various file types and attempts to load a library from an unsecured location. For successful exploitation, user interaction is necessary, as the user must either access a malicious webpage or open a compromised file. By leveraging this vulnerability, an attacker can execute arbitrary code within the context of the current application process, potentially gaining control over the system running Ashlar-Vellum Lithium.
Affected Version(s)
Lithium Lithium v12 Beta Build 1204.68
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved