Lucene search

K
githubGitHub Advisory DatabaseGHSA-MJR5-V9C9-MM7G
HistoryOct 01, 2022 - 12:00 a.m.

Joplin Remote Code Execution

2022-10-0100:00:20
CWE-20
GitHub Advisory Database
github.com
23
joplin
remote code execution
arbitrary commands
security vulnerability
markdown file
protocol validation
version 2.8.8

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

36.2%

Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the shell.openExternal function.

Affected configurations

Vulners
Node
joplin_projectjoplinRange2.8.8
VendorProductVersionCPE
joplin_projectjoplin*cpe:2.3:a:joplin_project:joplin:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

36.2%

Related for GHSA-MJR5-V9C9-MM7G