// For flags

CVE-2023-45673

Arbitrary code execution on click of PDF links in Joplin

Severity Score

8.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Joplin is a free, open source note taking and to-do application. A remote code execution (RCE) vulnerability in affected versions allows clicking on a link in a PDF in an untrusted note to execute arbitrary shell commands. Clicking links in PDFs allows for arbitrary code execution because Joplin desktop: 1. has not disabled top redirection for note viewer iframes, and 2. and has node integration enabled. This is a remote code execution vulnerability that impacts anyone who attaches untrusted PDFs to notes and has the icon enabled. This issue has been addressed in version 2.13.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Joplin es una aplicación gratuita y de código abierto para tomar notas y tareas pendientes. Una vulnerabilidad de ejecución remota de código (RCE) en las versiones afectadas permite hacer clic en un enlace en un PDF en una nota que no es de confianza para ejecutar comandos de shell arbitrarios. Hacer clic en enlaces en archivos PDF permite la ejecución de código arbitrario porque el escritorio Joplin: 1. no ha deshabilitado la redirección superior para los iframes del visor de notas, y 2. y tiene habilitada la integración de nodos. Esta es una vulnerabilidad de ejecución remota de código que afecta a cualquiera que adjunte archivos PDF que no sean de confianza a notas y tenga el ícono habilitado. Este problema se solucionó en la versión 2.13.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-10-10 CVE Reserved
  • 2024-06-21 CVE Published
  • 2024-06-22 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Laurent22
Search vendor "Laurent22"
Joplin
Search vendor "Laurent22" for product "Joplin"
< 2.13.3
Search vendor "Laurent22" for product "Joplin" and version " < 2.13.3"
en
Affected