joplin@0.8.68 vulnerabilities

Joplin CLI Client

  • latest version

    3.2.2

  • first published

    7 years ago

  • latest version published

    2 days ago

  • licenses detected

    • >=0.8.40 <2.10.1
  • Direct Vulnerabilities

    Known vulnerabilities in the joplin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Remote Code Execution (RCE)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to improper validation of the schema/protocol of existing links in a markdown file before passing them to the 'shell.openExternal' function. Exploiting this vulnerability is possible on any client that opens a link in a malicious markdown file via this package.

    How to fix Remote Code Execution (RCE)?

    There is no fixed version for joplin.

    *
    • H
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via note titles, due to unescaped user input reaching GotoAnything.tsx. This may lead to Remote Code Execution.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 2.9.1 or higher.

    <2.9.1
    • M
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitizing of NOSCRIPT tags in htmlUtils.ts.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 2.0.1 or higher.

    <2.0.1
    • H
    Remote Code Execution (RCE)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) through malicious code injected in a victim's search results.

    How to fix Remote Code Execution (RCE)?

    Upgrade joplin to version 2.8.1 or higher.

    <2.8.1
    • M
    Cross-site Request Forgery (CSRF)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade joplin to version 2.3.2 or higher.

    <2.3.2
    • M
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via button and form in the note body. This is because the sanitizeHtml method in Joplin desktop allows HTML tags with JavaScript attributes that give the possibility to execute arbitrary JavaScript code from the note body.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 2.1.1 or higher.

    <2.1.1
    • M
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via a LINK element in a note.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 1.4.2 or higher.

    <1.4.2
    • M
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS). It allows arbitrary code execution via a malicious HTML embed tag.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 1.1.4 or higher.

    <1.1.4
    • H
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via EMBED tags.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 1.1.1 or higher.

    <1.1.1
    • M
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via MdToHtml.js and HtmlToHtml.js

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 1.0.156 or higher.

    <1.0.156