Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
References
Link | Resource |
---|---|
https://starlabs.sg/advisories/23/23-2971/ | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
24 Aug 2023, 20:19
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
References | (MISC) https://starlabs.sg/advisories/23/23-2971/ - Exploit, Mitigation, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:* |
|
First Time |
Typora
Linux Linux linux Kernel Microsoft Microsoft windows Typora typora |
19 Aug 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-19 06:15
Updated : 2023-08-24 20:19
NVD link : CVE-2023-2971
Mitre link : CVE-2023-2971
JSON object : View
Products Affected
linux
- linux_kernel
microsoft
- windows
typora
- typora
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')