vendor:
Typora
by:
Dhiraj Mishra
7.8
CVSS
HIGH
Path Traversal
22
CWE
Product Name: Typora
Affected Version From: 0.9.9.24.6
Affected Version To: 0.9.9.24.6
Patch Exists: YES
Related CWE: CVE-2019-12137
CPE: a:typora:typora
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: macOS Mojave v10.14.4
2019
Code execution via path traversal
Typora 0.9.9.24.6 on macOS allows directory traversal, for the execution of arbitrary programs, via a file:/// or ../ substring in a shared note via abusing URI schemes. A crafted URI can be used in a note to perform this attack using file:/// has an argument or by traversing to any directory like (../../../../something.app). Since, Typro also has a feature of sharing notes, in such case attacker could leverage this vulnerability and send crafted notes to the victim to perform any further attack.
Mitigation:
Ensure that the application is not vulnerable to path traversal attacks by validating user input and restricting access to sensitive files and directories.