Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer.
References
Link | Resource |
---|---|
https://evernote.com/intl/en/security/updates | Vendor Advisory |
https://paper.seebug.org/737/ | Exploit Third Party Advisory |
https://evernote.com/intl/en/security/updates | Vendor Advisory |
https://paper.seebug.org/737/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://evernote.com/intl/en/security/updates - Vendor Advisory | |
References | () https://paper.seebug.org/737/ - Exploit, Third Party Advisory |
Information
Published : 2019-05-13 14:29
Updated : 2024-11-21 03:56
NVD link : CVE-2018-18524
Mitre link : CVE-2018-18524
CVE.ORG link : CVE-2018-18524
JSON object : View
Products Affected
evernote
- evernote
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')