Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Laurent 22
Laurent 22 joplin |
|
CPEs | cpe:2.3:a:laurent_22:joplin:*:*:*:*:*:*:*:* | |
Vendors & Products |
Laurent 22
Laurent 22 joplin |
|
Metrics |
ssvc
|
Mon, 25 Nov 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Joplin is an open source, privacy-focused note taking app with sync capabilities for Windows, macOS, Linux, Android and iOS. In affected versions attackers are able to abuse the fact that openExternal is used without any filtering of URI schemes to obtain remote code execution in Windows environments. This issue has been addressed in version 3.0.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Lack of validation on openExternal allows 1 click remote code execution in joplin | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-25T19:38:18.292Z
Reserved: 2024-11-19T20:08:14.481Z
Link: CVE-2024-53268

Updated: 2024-11-25T19:36:53.503Z

Status : Received
Published: 2024-11-25T20:15:10.583
Modified: 2024-11-25T20:15:10.583
Link: CVE-2024-53268

No data.