Description
DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
Published: 2023-08-19
Score: 8.6 High
EPSS: 49.3% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 07 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Linux Linux Kernel
Microsoft Windows
Typora Typora
cve-icon MITRE

Status: PUBLISHED

Assigner: STAR_Labs

Published:

Updated: 2024-10-07T19:57:59.068Z

Reserved: 2023-04-27T04:51:13.390Z

Link: CVE-2023-2317

cve-icon Vulnrichment

Updated: 2024-08-02T06:19:14.980Z

cve-icon NVD

Status : Modified

Published: 2023-08-19T06:15:46.687

Modified: 2024-11-21T07:58:22.570

Link: CVE-2023-2317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses