Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.
History

Thu, 14 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Joplinapp
Joplinapp joplin
CPEs cpe:2.3:a:joplinapp:joplin:*:*:*:*:*:node.js:*:*
Vendors & Products Joplinapp
Joplinapp joplin
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 17:45:00 +0000

Type Values Removed Values Added
Description Joplin is a free, open source note taking and to-do application. Joplin-desktop has a vulnerability that leads to remote code execution (RCE) when a user clicks on an <a> link within untrusted notes. The issue arises due to insufficient sanitization of <a> tag attributes introduced by the Mermaid. This vulnerability allows the execution of untrusted HTML content within the Electron window, which has full access to Node.js APIs, enabling arbitrary shell command execution.
Title Remote Code Execution on click of <a> Link in markdown preview
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-14T17:37:09.700Z

Updated: 2024-11-14T21:39:43.794Z

Reserved: 2024-10-14T13:56:34.810Z

Link: CVE-2024-49362

cve-icon Vulnrichment

Updated: 2024-11-14T21:39:38.922Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-14T18:15:19.243

Modified: 2024-11-15T13:58:08.913

Link: CVE-2024-49362

cve-icon Redhat

No data.