Platform
linux
Component
xreader
Fixed in
3.8.3
CVE-2023-44451 is a Remote Code Execution (RCE) vulnerability affecting Linux Mint Xreader versions 3.8.2 through 3.8.2. This flaw stems from insufficient validation of user-supplied paths during EPUB file parsing, enabling attackers to potentially execute arbitrary code. Exploitation requires user interaction, such as opening a malicious EPUB file or visiting a specially crafted webpage. A patch is available to address this vulnerability.
Successful exploitation of CVE-2023-44451 allows an attacker to execute arbitrary code on the affected Linux Mint system with the privileges of the Xreader process. This could lead to complete system compromise, including data theft, malware installation, and persistent backdoor access. The requirement for user interaction limits the immediate impact, but widespread use of Xreader and the potential for social engineering attacks make this a significant risk. Attackers could craft malicious EPUB files disguised as legitimate content to trick users into opening them, triggering the vulnerability.
CVE-2023-44451 was publicly disclosed on May 3, 2024. There is currently no indication of active exploitation in the wild, nor is it listed on the CISA KEV catalog. Public proof-of-concept (POC) code is not widely available, but the vulnerability's nature suggests that it is likely to be exploited if a readily available exploit is developed.
Exploit Status
EPSS
48.23% (98% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2023-44451 is to upgrade Xreader to a patched version as soon as it becomes available from the Linux Mint repositories. Until a patch is applied, consider restricting user access to untrusted EPUB files. While a direct WAF rule is unlikely to be effective, proxy servers can be configured to block access to known malicious EPUB file URLs. Monitor system logs for unusual file access patterns or process execution related to Xreader. There are no specific Sigma or YARA rules readily available for this vulnerability, but monitoring for unexpected process execution under the Xreader user is recommended.
Actualice Xreader a una versión posterior a 3.8.2. Esto solucionará la vulnerabilidad de recorrido de directorios al analizar archivos EPUB.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2023-44451 is a Remote Code Execution (RCE) vulnerability in Linux Mint Xreader versions 3.8.2–3.8.2. It allows attackers to execute code via a malicious EPUB file.
You are affected if you are using Linux Mint Xreader version 3.8.2–3.8.2 and are able to open EPUB files. Check your installed version and upgrade if necessary.
Upgrade Xreader to the latest available version through the Linux Mint package manager. This will include the necessary patch to address the vulnerability.
There is currently no confirmed evidence of active exploitation in the wild, but the vulnerability's nature makes it a potential target.
Refer to the official Linux Mint security advisories for the most up-to-date information and patch releases: https://www.linuxmint.com/security/.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.