DOM-based XSS in updater/update.html in Typora before 1.6.7 on Windows and Linux allows a crafted markdown file to run arbitrary JavaScript code in the context of Typora main window via loading typora://app/typemark/updater/update.html in <embed> tag. This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
References
Link | Resource |
---|---|
https://starlabs.sg/advisories/23/23-2317/ | Exploit Mitigation Third Party Advisory |
https://support.typora.io/What's-New-1.6/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-08-19 06:15
Updated : 2023-08-24 20:12
NVD link : CVE-2023-2317
Mitre link : CVE-2023-2317
CVE.ORG link : CVE-2023-2317
JSON object : View
Products Affected
typora
- typora
linux
- linux_kernel
microsoft
- windows
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')