Rapid7 Vulnerability & Exploit Database

Gentoo Linux: CVE-2022-23853: KTextEditor: Arbitrary Local Code Execution

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Gentoo Linux: CVE-2022-23853: KTextEditor: Arbitrary Local Code Execution

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
02/11/2022
Created
01/17/2024
Added
01/16/2024
Modified
01/16/2024

Description

The LSP (Language Server Protocol) plugin in KDE Kate before 21.12.2 and KTextEditor before 5.91.0 tries to execute the associated LSP server binary when opening a file of a given type. If this binary is absent from the PATH, it will try running the LSP server binary in the directory of the file that was just opened (due to a misunderstanding of the QProcess API, that was never intended). This can be an untrusted directory.

Solution(s)

  • gentoo-linux-upgrade-kde-frameworks-ktexteditor

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;