Description
DOM-based XSS in src/muya/lib/contentState/pasteCtrl.js in MarkText 0.17.1 and before on Windows, Linux and macOS allows arbitrary JavaScript code to run in the context of MarkText main window. This vulnerability can be exploited if a user copies text from a malicious webpage and paste it into MarkText.
References
https://github.com/marktext/marktext/issues/3618
ExploitIssue Tracking
https://starlabs.sg/advisories/23/23-2318/
ExploitThird Party Advisory
https://github.com/marktext/marktext/issues/3618
ExploitIssue Tracking
https://starlabs.sg/advisories/23/23-2318/
ExploitThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
8.6 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-08-19T04:15:46.883Z
2 years agoLast modified
2024-11-21T06:58:22.690Z
1 year ago