First published: Mon Mar 28 2022(Updated: )
Leanote 2.7.0 is vulnerable to Cross Site Scripting (XSS) in the markdown type note. This leads to remote code execution with payload : <video src=x onerror=(function(){require('child_process').exec('calc');})();>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Leanote Leanote | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43721 is a vulnerability in Leanote 2.7.0 that allows for Cross Site Scripting (XSS) attacks in the markdown type note, leading to remote code execution.
CVE-2021-43721 allows attackers to inject malicious code into a Leanote markdown type note, which can lead to remote code execution, potentially compromising the affected system.
CVE-2021-43721 has a severity rating of 6.1, which is considered medium.
To fix CVE-2021-43721, you should update Leanote to a version that includes a patch for this vulnerability, or apply any official security updates provided by the vendor.
You can find more information about CVE-2021-43721 on the GitHub issue page at: https://github.com/leanote/desktop-app/issues/364