Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://joplin.com | broken link |
https://github.com/ly1g3/Joplin-CVE-2022-35131 | third party advisory exploit |
https://github.com/laurent22/joplin/releases/tag/v2.9.1 | third party advisory release notes |