Bug 1228293 (CVE-2024-41662) - VUL-0: CVE-2024-41662: vnote: cross-site scripting vulnerability in the Markdown rendering functionality leads to remote code execution
Summary: VUL-0: CVE-2024-41662: vnote: cross-site scripting vulnerability in the Markd...
Status: NEW
Alias: CVE-2024-41662
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Grover Chou
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/415072/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-24 18:57 UTC by SMASH SMASH
Modified: 2024-07-24 19:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-24 18:57:48 UTC
VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-41662
https://www.cve.org/CVERecord?id=CVE-2024-41662
https://github.com/vnotex/vnote/commit/f1af78573a0ef51d6ef6a0bc4080cddc8f30a545
https://github.com/vnotex/vnote/security/advisories/GHSA-w655-h68w-vxxc
Comment 1 Camila Camargo de Matos 2024-07-24 19:00:05 UTC
Package vnote seems to be vulnerable in the following (currently supported) codestreams:

- openSUSE:Backports:SLE-15-SP5
- openSUSE:Backports:SLE-15-SP6
- openSUSE:Factory