Proton v0.2.0 - XSS To RCE
7,1
High
Discovered by
Offensive Team, Fluid Attacks
Summary
Full name
Proton v0.2.0 - XSS To RCE
Code name
State
Public
Release date
17 may 2022
Affected product
Proton Markdown
Affected version(s)
Version 0.2.0
Vulnerability name
XSS to RCE
Vulnerability type
Remotely exploitable
No
CVSS v3.1 vector string
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
CVSS v3.1 base score
7.1
Exploit available
No
CVE ID(s)
Description
Proton v0.2.0 allows an attacker to create a malicious link inside a markdown file. When the victim clicks the link, the application opens the site in the current frame allowing an attacker to host JavaScript code in the malicious link in order to trigger an XSS attack. The nodeIntegration
configuration is set to on which allows the webpage to use NodeJs
features, an attacker can leverage this to run OS commands.
Proof of Concept
Steps to reproduce
Create a markdown file with the following content.
Host the
rce.html
file with the following content on a server controlled by the attacker.Send the markdown file to the victim. When the victim clicks the markdown link the site will be open inside electron and the JavaScript code will spawn a calculator.
System Information
Version: Proton v0.2.0.
Operating System: Windows 10.0.19042 N/A Build 19042.
Installer: Proton.Setup.0.2.0.exe
Exploit
There is no exploit for the vulnerability but can be manually exploited.
Mitigation
By 2022-05-17 there is not a patch resolving the issue.
References
Vendor page https://github.com/steventhanna/proton/
Timeline
IA generativa
29 abr 2022
Vendor contacted
29 abr 2022
Public disclosure
17 may 2022