Description
Improper path handling in Obsidian desktop before 1.2.8 on Windows, Linux and macOS allows a crafted webpage to access local files and exfiltrate them to remote web servers via "app://local/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Obsidian, or copies text from a malicious webpage and paste it into Obsidian.
References
https://starlabs.sg/advisories/23/23-2110/
ExploitMitigationThird Party Advisory
https://starlabs.sg/advisories/23/23-2110/
ExploitMitigationThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
8.2 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-08-19T04:15:45.613Z
2 years agoLast modified
2024-11-21T06:57:57.580Z
1 year ago