Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Mon, 25 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Laurent 22
Laurent 22 joplin
CPEs cpe:2.3:a:laurent_22:joplin:*:*:*:*:*:*:*:*
Vendors & Products Laurent 22
Laurent 22 joplin
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 25 Nov 2024 19:30:00 +0000

Type Values Removed Values Added
Description Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Lack of validation on openExternal allows 1 click remote code execution in joplin
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-11-25T19:22:17.131Z

Updated: 2024-11-25T19:38:18.292Z

Reserved: 2024-11-19T20:08:14.481Z

Link: CVE-2024-53268

cve-icon Vulnrichment

Updated: 2024-11-25T19:36:53.503Z

cve-icon NVD

Status : Received

Published: 2024-11-25T20:15:10.583

Modified: 2024-11-25T20:15:10.583

Link: CVE-2024-53268

cve-icon Redhat

No data.