CVE-2023-40168
📋 TL;DR
This vulnerability in TurboWarp Desktop allows malicious Scratch projects or custom extensions to read arbitrary files from the user's disk and upload them to remote servers without user consent. Only the desktop application versions before 1.8.0 are affected, not the web version. Users who open untrusted sb3 files or load untrusted extensions are at risk.
💻 Affected Systems
- TurboWarp Desktop
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of sensitive files including passwords, private keys, documents, and personal data being exfiltrated to attacker-controlled servers.
Likely Case
Theft of user files from the compromised system, potentially including sensitive documents, configuration files, or other accessible data.
If Mitigated
No impact if users only open trusted projects and extensions, or if the vulnerability is patched.
🎯 Exploit Status
Exploitation requires user interaction (opening malicious file) but no authentication. The vulnerability is in file system access controls within the application.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.8.0 and later
Vendor Advisory: https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q
Restart Required: Yes
Instructions:
1. Download TurboWarp Desktop version 1.8.0 or later from official sources. 2. Install the update. 3. Restart the application.
🔧 Temporary Workarounds
Restrict file access
allRun TurboWarp in a sandboxed environment or with restricted file system permissions
🧯 If You Can't Patch
- Avoid opening sb3 files or loading extensions from untrusted sources
- Use the web version of TurboWarp instead of the desktop application
🔍 How to Verify
Check if Vulnerable:
Check TurboWarp Desktop version in application settings or About dialog
Check Version:
Check application version in Help > About or Settings
Verify Fix Applied:
Verify version is 1.8.0 or higher after update
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from TurboWarp process
- Network connections to unknown servers after opening sb3 files
Network Indicators:
- Outbound connections to suspicious domains/IPs after file operations
- Unexpected file upload traffic
SIEM Query:
Process:TurboWarp AND (FileAccess:* OR NetworkConnection:*)
🔗 References
- https://github.com/TurboWarp/desktop/commit/55e07e99b59db334d75e8f46792a1569ab0884a6
- https://github.com/TurboWarp/desktop/commit/a62dbd7a28b41857e3b6f32443fda0527d493267
- https://github.com/TurboWarp/desktop/commit/f0f82aaf6cc8170e9da8b36953c98bfe533c019f
- https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q
- https://github.com/TurboWarp/desktop/commit/55e07e99b59db334d75e8f46792a1569ab0884a6
- https://github.com/TurboWarp/desktop/commit/a62dbd7a28b41857e3b6f32443fda0527d493267
- https://github.com/TurboWarp/desktop/commit/f0f82aaf6cc8170e9da8b36953c98bfe533c019f
- https://github.com/TurboWarp/desktop/security/advisories/GHSA-wg4p-vj7h-q82q