From 0049f89efb66bb3e86e104c024409b27df406025 Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Mon, 28 Aug 2023 13:55:42 +0800 Subject: [PATCH] =?UTF-8?q?Create=20=E5=9F=BA=E4=BA=8ETypora=20DOM?= =?UTF-8?q?=E7=9A=84=E8=B7=A8=E7=AB=99=E7=82=B9=E8=84=9A=E6=9C=AC=E5=AF=BC?= =?UTF-8?q?=E8=87=B4=E8=BF=9C=E7=A8=8B=E4=BB=A3=E7=A0=81=E6=89=A7=E8=A1=8C?= =?UTF-8?q?=EF=BC=88CVE-2023-2317=EF=BC=89.md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ... DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md diff --git a/基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md b/基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md new file mode 100644 index 0000000..6f79398 --- /dev/null +++ b/基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317).md @@ -0,0 +1,11 @@ + +# 基于Typora DOM的跨站点脚本导致远程代码执行(CVE-2023-2317) + +## 漏洞简介 + +Windows和Linux版本1.6.7之前的Typora中updater/update.html中基于DOM的XSS允许特制的markdown文件通过加载在Typora主窗口的上下文中运行任意JavaScript代码`typora://app/typemark/updater/update.html`在<embed>标记中。如果用户在Typora中打开恶意降价文件,或者从恶意网页复制文本并将其粘贴到Typora,则可以利用此漏洞。 + +```html + +``` +