joplin@2.4.1 vulnerabilities

Joplin CLI Client

  • latest version

    3.2.2

  • first published

    7 years ago

  • latest version published

    1 days ago

  • licenses detected

    • >=0.8.40 <2.10.1
  • Direct Vulnerabilities

    Known vulnerabilities in the joplin package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Remote Code Execution (RCE)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) due to improper validation of the schema/protocol of existing links in a markdown file before passing them to the 'shell.openExternal' function. Exploiting this vulnerability is possible on any client that opens a link in a malicious markdown file via this package.

    How to fix Remote Code Execution (RCE)?

    There is no fixed version for joplin.

    *
    • H
    Cross-site Scripting (XSS)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via note titles, due to unescaped user input reaching GotoAnything.tsx. This may lead to Remote Code Execution.

    How to fix Cross-site Scripting (XSS)?

    Upgrade joplin to version 2.9.1 or higher.

    <2.9.1
    • H
    Remote Code Execution (RCE)

    joplin is a note taking and to-do application.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) through malicious code injected in a victim's search results.

    How to fix Remote Code Execution (RCE)?

    Upgrade joplin to version 2.8.1 or higher.

    <2.8.1