First published: Fri Jun 21 2024(Updated: )
Joplin is a free, open source note taking and to-do application. A remote code execution (RCE) vulnerability in affected versions allows clicking on a link in a PDF in an untrusted note to execute arbitrary shell commands. Clicking links in PDFs allows for arbitrary code execution because Joplin desktop: 1. has not disabled top redirection for note viewer iframes, and 2. and has node integration enabled. This is a remote code execution vulnerability that impacts anyone who attaches untrusted PDFs to notes and has the icon enabled. This issue has been addressed in version 2.13.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Joplin | <2.13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45673 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2023-45673, update Joplin to version 2.13.4 or later where the vulnerability has been addressed.
CVE-2023-45673 enables remote code execution attacks through malicious links in PDFs within untrusted notes.
All Joplin versions prior to 2.13.4 are affected by CVE-2023-45673.
CVE-2023-45673 requires user interaction, specifically clicking on a link in a PDF, to trigger the exploit.