Vulnerabilities/

Joplin Remote Code Execution

Severity:
High

Description

Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the shell.openExternal function.

Recommendation

No fix is available yet. Followings are affected versions:

References

Related Issues

Tags:
npm
joplin
Anything's wrong? Let us know Last updated on April 23, 2024

This issue is available in SmartScanner Professional

See Pricing