CVE-2023-2318
MarkText DOM-Based Cross-site Scripting leading to Remote Code Execution
Severity Score
9.6
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
Cross-Site Scripting (XSS) basado en DOM en src/muya/lib/contentState/pasteCtrl.js de MarkText 0.17.1. y anteriores en Windows, Linux y macOS permite ejecutar código JavaScript arbitrario en el contexto de la ventana principal de MarkText. Esta vulnerabilidad puede explotarse si un usuario copia texto de una página web maliciosa y lo pega en MarkText.
*Credits:
Li Jiantao (@CurseRed) of STAR Labs SG Pte. Ltd. (@starlabs_sg)
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-04-27 CVE Reserved
- 2023-08-19 CVE Published
- 2024-10-07 CVE Updated
- 2024-10-07 First Exploit
- 2025-01-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
- CAPEC-549: Local Execution of Code
- CAPEC-588: DOM-Based XSS
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/marktext/marktext/issues/3618 | 2024-10-07 | |
https://starlabs.sg/advisories/23/23-2318 | 2024-10-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Marktext Search vendor "Marktext" | Marktext Search vendor "Marktext" for product "Marktext" | <= 0.17.1 Search vendor "Marktext" for product "Marktext" and version " <= 0.17.1" | - |
Affected
| in | Apple Search vendor "Apple" | Macos Search vendor "Apple" for product "Macos" | - | - |
Safe
|
Marktext Search vendor "Marktext" | Marktext Search vendor "Marktext" for product "Marktext" | <= 0.17.1 Search vendor "Marktext" for product "Marktext" and version " <= 0.17.1" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Safe
|
Marktext Search vendor "Marktext" | Marktext Search vendor "Marktext" for product "Marktext" | <= 0.17.1 Search vendor "Marktext" for product "Marktext" and version " <= 0.17.1" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | - | - |
Safe
|