Bug 1228293 (CVE-2024-41662)

Summary: VUL-0: CVE-2024-41662: vnote: cross-site scripting vulnerability in the Markdown rendering functionality leads to remote code execution
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Grover Chou <groverchout>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: camila.matos
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/415072/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-24 18:57:48 UTC
VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-41662
https://www.cve.org/CVERecord?id=CVE-2024-41662
https://github.com/vnotex/vnote/commit/f1af78573a0ef51d6ef6a0bc4080cddc8f30a545
https://github.com/vnotex/vnote/security/advisories/GHSA-w655-h68w-vxxc
Comment 1 Camila Camargo de Matos 2024-07-24 19:00:05 UTC
Package vnote seems to be vulnerable in the following (currently supported) codestreams:

- openSUSE:Backports:SLE-15-SP5
- openSUSE:Backports:SLE-15-SP6
- openSUSE:Factory