Lucene search

K
githubGitHub Advisory DatabaseGHSA-WW2V-FRV5-PJ5X
HistoryJul 26, 2022 - 12:00 a.m.

Joplin is vulnerable to arbitrary code execution

2022-07-2600:00:28
CWE-79
GitHub Advisory Database
github.com
14
joplin
arbitrary code execution
software vulnerability
node titles

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

53.6%

Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.

Affected configurations

Vulners
Node
joplin_projectjoplinRange<2.9.1
CPENameOperatorVersion
joplinlt2.9.1

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

53.6%

Related for GHSA-WW2V-FRV5-PJ5X