First published: Fri Sep 30 2022(Updated: )
Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joplinapp Joplin | =2.8.8 | |
Linux Linux kernel | ||
Canonical Ubuntu Linux | =20.04 | |
npm/joplin | <=2.8.8 | |
All of | ||
Joplinapp Joplin | =2.8.8 | |
Linux Linux kernel | ||
All of | ||
Joplinapp Joplin | =2.8.8 | |
Canonical Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40277 is a vulnerability in Joplin version 2.8.8 that allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file.
CVE-2022-40277 works by exploiting the lack of proper validation of the schema/protocol of existing links in markdown files opened in Joplin, allowing an attacker to execute arbitrary commands remotely.
The severity of CVE-2022-40277 is high, with a CVSS score of 7.8.
Joplin version 2.8.8 is affected by CVE-2022-40277.
To fix CVE-2022-40277, it is recommended to update Joplin to a version that includes the necessary security patches.