An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/laurent22/joplin/issues/3552 | third party advisory |
https://github.com/laurent22/joplin/releases/tag/v1.1.4 | third party advisory release notes |
http://packetstormsecurity.com/files/159316/Joplin-1.0.245-Cross-Site-Scripting-Code-Execution.html | third party advisory exploit |