Vulnerability Description
In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an application, Gatekeeper may still permit the execution of the application, enabling the execution of arbitrary commands within the application's context. NOTE: the vendor's perspective is that this is simply an instance of CVE-2022-48505, cannot properly be categorized as a product-level vulnerability, and cannot have a product-level fix because it is about incorrect caching of file signatures on macOS.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Notion | Web Clipper | 1.0.3\(7\) |
Related Weaknesses (CWE)
References
- https://blog.xpnsec.com/dirtynib/
- https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why
- https://github.com/louiselalanne/CVE-2024-23745ExploitThird Party Advisory
- https://blog.xpnsec.com/dirtynib/
- https://chromium.googlesource.com/chromium/src/+/master/docs/security/faq.md#Why
- https://github.com/louiselalanne/CVE-2024-23745ExploitThird Party Advisory
FAQ
What is CVE-2024-23745?
CVE-2024-23745 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In Notion Web Clipper 1.0.3(7), a .nib file is susceptible to the Dirty NIB attack. NIB files can be manipulated to execute arbitrary commands. Additionally, even if a NIB file is modified within an a...
How severe is CVE-2024-23745?
CVE-2024-23745 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-23745?
Check the references section above for vendor advisories and patch information. Affected products include: Notion Web Clipper.