VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content.
References
Link | Resource |
---|---|
https://github.com/vnotex/vnote/commit/f1af78573a0ef51d6ef6a0bc4080cddc8f30a545 | Patch |
https://github.com/vnotex/vnote/security/advisories/GHSA-w655-h68w-vxxc | Exploit Third Party Advisory |
https://github.com/vnotex/vnote/commit/f1af78573a0ef51d6ef6a0bc4080cddc8f30a545 | Patch |
https://github.com/vnotex/vnote/security/advisories/GHSA-w655-h68w-vxxc | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-07-24 17:15
Updated : 2024-11-21 09:32
NVD link : CVE-2024-41662
Mitre link : CVE-2024-41662
CVE.ORG link : CVE-2024-41662
JSON object : View
Products Affected
vnote_project
- vnote
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')