VNote is a note-taking platform. Prior to 3.18.1, a code execution vulnerability existed in VNote, which allowed an attacker to execute arbitrary programs on the victim's system. A crafted URI can be used in a note to perform this attack using file:/// as a link. For example, file:///C:/WINDOWS/system32/cmd.exe. This allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as file:///C:/WINDOWS/system32/cmd.exe and file:///C:/WINDOWS/system32/calc.exe. This vulnerability can be exploited by creating and sharing specially crafted notes. An attacker could send a crafted note file and perform further attacks. This vulnerability is fixed in 3.18.1.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-02T04:33:11.301Z

Reserved: 2024-07-02T19:37:18.600Z

Link: CVE-2024-39904

cve-icon Vulnrichment

Updated: 2024-08-02T04:33:11.301Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-11T16:15:04.860

Modified: 2024-11-21T09:28:32.210

Link: CVE-2024-39904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.