Description
Proton v0.2.0 allows an attacker to create a malicious link inside a markdown file. When the victim clicks the link, the application opens the site in the current frame allowing an attacker to host JavaScript code in the malicious link in order to trigger an XSS attack. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands.
Published: 2022-05-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-29923 Proton v0.2.0 allows an attacker to create a malicious link inside a markdown file. When the victim clicks the link, the application opens the site in the current frame allowing an attacker to host JavaScript code in the malicious link in order to trigger an XSS attack. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands.
History

No history.

Subscriptions

Proton Project Proton
cve-icon MITRE

Status: PUBLISHED

Assigner: Fluid Attacks

Published:

Updated: 2024-08-03T04:36:06.522Z

Reserved: 2022-02-15T00:00:00.000Z

Link: CVE-2022-25224

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-20T12:15:10.883

Modified: 2024-11-21T06:51:50.187

Link: CVE-2022-25224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses