CVE-2020-17354
CVSS V2 None
CVSS V3 None
Description
LilyPond before 2.24 allows attackers to bypass the -dsafe protection mechanism via output-def-lookup or output-def-scope, as demonstrated by dangerous Scheme code in a .ly file that causes arbitrary code execution during conversion to a different file format. NOTE: in 2.24 and later versions, safe mode is removed, and the product no longer tries to block code execution when external files are used.
Overview
- CVE ID
- CVE-2020-17354
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-04-15T22:15:06
- Last Modified Date
- 2023-04-25T16:52:41
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:lilypond:lilypond:*:*:*:*:*:*:*:* | 1 | OR | 2.24.0 |
References
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-17354 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17354 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:47:43 | Added to TrackCVE | |||
2023-04-17 14:01:27 | 2023-04-17T13:12:43 | CVE Modified Date | updated | |
2023-04-17 14:01:27 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-04-20 15:01:07 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-04-25 17:00:47 | 2023-04-25T16:52:41 | CVE Modified Date | updated | |
2023-04-25 17:00:48 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-25 17:00:49 | Weakness Enumeration | new | ||
2023-04-25 17:00:52 | CPE Information | updated |