This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33820 | Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. |
Mon, 07 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: STAR_Labs
Published:
Updated: 2024-10-07T19:59:27.236Z
Reserved: 2023-04-27T04:51:09.913Z
Link: CVE-2023-2316
Updated: 2024-08-02T06:19:14.860Z
Status : Modified
Published: 2023-08-19T06:15:46.420
Modified: 2024-11-21T07:58:22.443
Link: CVE-2023-2316
No data.
OpenCVE Enrichment
No data.
EUVD