vendor:
Joplin
by:
Ademar Nowasky Junior
6.1
CVSS
MEDIUM
Arbitrary Code Execution
Unknown
CWE
Product Name: Joplin
Affected Version From: 1.0.190
Affected Version To: 1.0.245
Patch Exists: NO
Related CWE: CVE-2020-15930
CPE: Unknown
Platforms Tested: Windows, Linux
2020
Joplin 1.0.245 – Arbitrary Code Execution (PoC)
An XSS issue in Joplin for desktop v1.0.190 to v1.0.245 allows arbitrary code execution via a malicious HTML embed tag. HTML embed tags are not blacklisted in Joplin's renderer. This can be chained with a bug where child windows opened through window.open() have node integration enabled to achieve ACE. If Joplin API is enabled, Remote Code Execution with user interaction is possible by abusing the lack of required authentication in Joplin 'POST /notes' api endpoint to remotely deploy the payload into the victim application.
Mitigation:
Unknown