CVE-2023-28371
📋 TL;DR
CVE-2023-28371 is a path traversal vulnerability in Stellarium that allows attackers to write files to unintended locations using absolute paths or directory traversal sequences. This affects all users running Stellarium versions through 1.2, potentially enabling arbitrary file write operations.
💻 Affected Systems
- Stellarium
📦 What is this software?
Stellarium by Stellarium
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via arbitrary file write leading to remote code execution, privilege escalation, or system file corruption.
Likely Case
Local file system manipulation, configuration file overwrites, or data corruption within user-writable directories.
If Mitigated
Limited to application-specific file writes within sandboxed environments with proper file system permissions.
🎯 Exploit Status
Exploitation requires user interaction or local access. The vulnerability is in file handling logic that doesn't properly validate paths.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Stellarium 1.3 and later
Vendor Advisory: https://github.com/Stellarium/stellarium/security/advisories
Restart Required: Yes
Instructions:
1. Download Stellarium 1.3 or later from official sources. 2. Uninstall previous version. 3. Install new version. 4. Restart system if prompted.
🔧 Temporary Workarounds
Restrict File System Access
linuxRun Stellarium with reduced privileges using sandboxing or containerization
flatpak run org.stellarium.Stellarium
firejail stellarium
Disable Network Features
allBlock Stellarium network access to prevent remote exploitation vectors
sudo ufw deny out from any to any app 'stellarium'
Use Windows Firewall to block stellarium.exe
🧯 If You Can't Patch
- Run Stellarium in a sandboxed environment with restricted file system access
- Remove execute permissions for untrusted users and limit application to trusted accounts only
🔍 How to Verify
Check if Vulnerable:
Check Stellarium version: If version is 1.2 or earlier, system is vulnerable.
Check Version:
stellarium --version (Linux/macOS) or check About in GUI (Windows)
Verify Fix Applied:
Verify Stellarium version is 1.3 or later and check that the commit fixes (1261f74dc4aa6bbd01ab514343424097f8cf46b7, 787a894897b7872ae96e6f5804a182210edd5c78, eba61df3b38605befcb43687a4c0a159dbc0c5cb) are applied.
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations from stellarium process
- Path traversal patterns in file access logs
Network Indicators:
- Unexpected network activity from stellarium if normally offline
SIEM Query:
process.name='stellarium' AND file.path CONTAINS '..' OR file.path STARTSWITH '/'
🔗 References
- https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7
- https://github.com/Stellarium/stellarium/commit/787a894897b7872ae96e6f5804a182210edd5c78
- https://github.com/Stellarium/stellarium/commit/eba61df3b38605befcb43687a4c0a159dbc0c5cb
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KG6UNRAOYZJSMIUELY3MMJ5J6LIUZXLT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/REDZB5J7WDN2P3NYWFO2NNJXSTOFUUKM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQ4ZGY5MDDHBEOQTD4IIA2RFID3ATPXA/
- https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7
- https://github.com/Stellarium/stellarium/commit/787a894897b7872ae96e6f5804a182210edd5c78
- https://github.com/Stellarium/stellarium/commit/eba61df3b38605befcb43687a4c0a159dbc0c5cb
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KG6UNRAOYZJSMIUELY3MMJ5J6LIUZXLT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/REDZB5J7WDN2P3NYWFO2NNJXSTOFUUKM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQ4ZGY5MDDHBEOQTD4IIA2RFID3ATPXA/