Joplin App Desktop Version Vulnerable to XSS

Dear Reader Jubair Rehman Yousafzai Here:

Update Sept 2022: CVE assigned CVE-2021-33295

https://www.cvedetails.com/cve/CVE-2021-33295/

During the testing of Joplin App Desktop Version before 1.8.5 I was able to execute the malicious XSS when entered in Main body of Joplin App Desktop, 

Once I click on Toggle button twice, the payload was executed successfully.

The payload which I have used for this testing is as below

<noscript><p title="</noscript><img src=x onerror=alert('testing')>"> 

Below is the POC for this exploit

 

After reporting to the Joplin team they fixed the issue directly and released the fixed in 1.8.5 version. 

Below are their release notes and details:

 https://github.com/laurent22/joplin/releases/tag/v1.8.5

 

Thanks

Jubair Rehman: https://twitter.com/jubairfolder




Comments

Popular posts from this blog

Ericsson BSCS iX R18 Billing & Rating (ADMX, MX) - Stored XSS (CVE-2020-29144, CVE-2020-29145)

Enjay CRM 1.0 - Multiple code executions via Unrestricted Terminal

NetSkope Unauthenticated CSV Injection in Admin UI (CVE-2020-28845)