CVE-2024-23347

7.8 HIGH

📋 TL;DR

Meta Spark Studio versions before v176 automatically execute scripts from package.json files when opening projects, allowing arbitrary code execution. This affects users who open untrusted projects in Meta Spark Studio, potentially compromising their systems.

💻 Affected Systems

Products:
  • Meta Spark Studio
Versions: All versions prior to v176
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when opening any project containing a malicious package.json file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through remote code execution, allowing attackers to install malware, steal data, or gain persistent access.

🟠

Likely Case

Attackers trick users into opening malicious projects, executing code to steal credentials or install ransomware.

🟢

If Mitigated

Limited impact if users only open trusted projects from verified sources.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open a malicious project file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v176 and later

Vendor Advisory: https://www.facebook.com/security/advisories/cve-2024-23347

Restart Required: Yes

Instructions:

1. Open Meta Spark Studio. 2. Check for updates in Help menu. 3. Install v176 or later. 4. Restart application.

🔧 Temporary Workarounds

Avoid untrusted projects

all

Only open projects from trusted sources until patched.

🧯 If You Can't Patch

  • Discontinue use of Meta Spark Studio until patched.
  • Use in isolated virtual machine environment.

🔍 How to Verify

Check if Vulnerable:

Check Meta Spark Studio version in Help > About. If version is below 176, you are vulnerable.

Check Version:

Not applicable - check via application GUI.

Verify Fix Applied:

Confirm version is 176 or higher in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Meta Spark Studio
  • Script execution from package.json files

Network Indicators:

  • Unusual outbound connections from Meta Spark Studio process

SIEM Query:

Process creation where parent process contains 'spark' and command line contains suspicious scripts

🔗 References

📤 Share & Export