DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
References
Link | Resource |
---|---|
https://starlabs.sg/advisories/23/23-2317/ | Exploit Mitigation Third Party Advisory |
https://support.typora.io/What's-New-1.6/ | Vendor Advisory |
https://starlabs.sg/advisories/23/23-2317/ | Exploit Mitigation Third Party Advisory |
https://support.typora.io/What's-New-1.6/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:58
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
References | () https://starlabs.sg/advisories/23/23-2317/ - Exploit, Mitigation, Third Party Advisory | |
References | () https://support.typora.io/What's-New-1.6/ - Vendor Advisory |
24 Aug 2023, 20:12
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://support.typora.io/What's-New-1.6/ - Vendor Advisory | |
References | (MISC) https://starlabs.sg/advisories/23/23-2317/ - Exploit, Mitigation, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.6 |
CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
CWE | CWE-79 | |
First Time |
Linux
Microsoft Microsoft windows Typora typora Typora Linux linux Kernel |
20 Aug 2023, 00:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-19 06:15
Updated : 2024-11-21 07:58
NVD link : CVE-2023-2317
Mitre link : CVE-2023-2317
CVE.ORG link : CVE-2023-2317
JSON object : View
Products Affected
typora
- typora
linux
- linux_kernel
microsoft
- windows
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')