Source: anki
X-Debbugs-CC: [email protected]
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for anki.

CVE-2024-26020[0]:
| An arbitrary script execution vulnerability exists in the MPV
| functionality of Ankitects Anki 24.04. A specially crafted flashcard
| can lead to a arbitrary code execution. An attacker can send
| malicious flashcard to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1993


CVE-2024-32152[1]:
| A blocklist bypass vulnerability exists in the LaTeX functionality
| of Ankitects Anki 24.04. A specially crafted malicious flashcard can
| lead to an arbitrary file creation at a fixed path. An attacker can
| share a malicious flashcard to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1994


CVE-2024-32484[2]:
| An reflected XSS vulnerability exists in the handling of invalid
| paths in the Flask server in Ankitects Anki 24.04. A specially
| crafted flashcard can lead to JavaScript code execution and result
| in an arbitrary file read. An attacker can share a malicious
| flashcard to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1995


CVE-2024-29073[3]:
| An vulnerability in the handling of Latex exists in Ankitects Anki
| 24.04. When Latex is sanitized to prevent unsafe commands, the
| verbatim package, which comes installed by default in many Latex
| distributions, has been overlooked. A specially crafted flashcard
| can lead to an arbitrary file read. An attacker can share a
| flashcard to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1992


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-26020
    https://www.cve.org/CVERecord?id=CVE-2024-26020
[1] https://security-tracker.debian.org/tracker/CVE-2024-32152
    https://www.cve.org/CVERecord?id=CVE-2024-32152
[2] https://security-tracker.debian.org/tracker/CVE-2024-32484
    https://www.cve.org/CVERecord?id=CVE-2024-32484
[3] https://security-tracker.debian.org/tracker/CVE-2024-29073
    https://www.cve.org/CVERecord?id=CVE-2024-29073

Please adjust the affected versions in the BTS as needed.

Reply via email to