Description
Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
References
https://starlabs.sg/advisories/23/23-2971/
ExploitMitigationThird Party Advisory
https://starlabs.sg/advisories/23/23-2971/
ExploitMitigationThird Party Advisory
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
6.3 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2023-08-19T04:15:47.037Z
2 years agoLast modified
2024-11-21T06:59:40.130Z
1 year ago