Lucene search

K
cve[email protected]CVE-2022-40276
HistoryNov 03, 2022 - 8:15 p.m.

CVE-2022-40276

2022-11-0320:15:31
CWE-20
web.nvd.nist.gov
242
4
zettlr
cve-2022-40276
file access
markdown
security issue

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

31.7%

Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them.

Affected configurations

NVD
Node
zettlrzettlrMatch2.3.0
CPENameOperatorVersion
zettlr:zettlrzettlreq2.3.0

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Zettlr",
    "versions": [
      {
        "version": "2.3.0",
        "status": "affected"
      }
    ]
  }
]

Social References

More

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

31.7%

Related for CVE-2022-40276