DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 07 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2024-10-07T19:57:59.068Z
Reserved: 2023-04-27T04:51:13.390Z
Link: CVE-2023-2317
Updated: 2024-08-02T06:19:14.980Z
Status : Modified
Published: 2023-08-19T06:15:46.687
Modified: 2024-11-21T07:58:22.570
Link: CVE-2023-2317
No data.
OpenCVE Enrichment
No data.
Weaknesses