CVE-2021-33295
https://notcve.org/view.php?id=CVE-2021-33295
Cross Site Scripting (XSS) vulnerability in Joplin Desktop App before 1.8.5 allows attackers to execute aribrary code due to improper sanitizing of html. Una vulnerabilidad de tipo Cross Site Scripting (XSS) en Joplin Desktop App versiones anteriores a 1.8.5, permite a atacantes ejecutar código arbitrario debido a un saneo inapropiado del html • https://github.com/laurent22/joplin/commit/9c20d5947d1fa4678a8b640792ff3d31224f0adf https://github.com/laurent22/joplin/releases/tag/v1.8.5 https://the-it-wonders.blogspot.com/2021/05/joplin-app-desktop-version-vulnerable.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-23431 – Cross-site Request Forgery (CSRF)
https://notcve.org/view.php?id=CVE-2021-23431
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms. El paquete joplin versiones anteriores a 2.3.2, es vulnerable a un ataque de tipo Cross-site Request Forgery (CSRF) debido a que faltan comprobaciones de tipo CSRF en varios formularios. • https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-37916
https://notcve.org/view.php?id=CVE-2021-37916
Joplin before 2.0.9 allows XSS via button and form in the note body. Joplin versiones anteriores a 2.0.9, permite un ataque XSS por medio del button y form en el cuerpo de la nota • https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 https://github.com/laurent22/joplin/releases/tag/v2.0.9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-9038 – Joplin Desktop 1.0.184 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2020-9038
Joplin through 1.0.184 allows Arbitrary File Read via XSS. Joplin versiones hasta 1.0.184, permite una Lectura de Archivos Arbitrarios por medio de un ataque de tipo XSS. Joplin Desktop version 1.0.184 suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/48147 https://github.com/JavierOlmedo/CVE-2020-9038 https://github.com/ossf-cve-benchmark/CVE-2020-9038 http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-1000534
https://notcve.org/view.php?id=CVE-2018-1000534
Joplin version prior to 1.0.90 contains a XSS evolving into code execution due to enabled nodeIntegration for that particular BrowserWindow instance where XSS was identified from vulnerability in Note content field - information on the fix can be found here https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 that can result in executing unauthorized code within the rights in which the application is running. This attack appear to be exploitable via Victim synchronizing notes from the cloud services or other note-keeping services which contain malicious code. This vulnerability appears to have been fixed in 1.0.90 and later. Joplin en versiones anteriores a la 1.0.90 contiene Cross-Site Scripting (XSS) que evoluciona a una ejecución de código debido a que se habilita nodeIntegration para esa instancia BrowserWindow en concreto en la que se identificó XSS a partir de la vulnerabilidad en el campo de contenido Note. La información sobre la solución se puede encontrar en https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89. • https://github.com/laurent22/joplin/commit/494e235e18659574f836f84fcf9f4d4fcdcfcf89 https://github.com/laurent22/joplin/issues/500 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •