CVE-2024-39904

External Control of File Name or Path (CWE-73)

Published: Jul 11, 2024 / Updated: 4mo ago

010
CVSS 8.8EPSS 0.04%High
CVE info copied to clipboard

Summary

VNote, a note-taking platform, contains a code execution vulnerability in versions prior to 3.18.1. This vulnerability allows an attacker to execute arbitrary programs on the victim's system by using a crafted URI with the file:/// scheme as a link within a note. For example, an attacker could embed references to local executable files such as file:///C:/WINDOWS/system32/cmd.exe or file:///C:/WINDOWS/system32/calc.exe in a note. This vulnerability can be exploited by creating and sharing specially crafted notes.

Impact

The impact of this vulnerability is severe. An attacker can execute arbitrary programs on the victim's system, potentially leading to full system compromise. This could result in unauthorized access, data theft, system manipulation, or further malware installation. The vulnerability has high impacts on confidentiality, integrity, and availability of the affected system. The CVSS v3.1 base score is 8.8, indicating a high severity level.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been fixed in VNote version 3.18.1.

Mitigation

1. Upgrade VNote to version 3.18.1 or later immediately. 2. If immediate upgrading is not possible, avoid opening notes from untrusted sources. 3. Implement strict input validation and sanitization for all user-supplied content, especially URLs and file paths. 4. Consider disabling the ability to use file:/// URIs in notes if this feature is not critical for operations. 5. Educate users about the risks of opening notes from unknown sources. 6. Monitor systems for any suspicious activities or unexpected program executions.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-39904

Jul 11, 2024 at 4:15 PM
CVSS

A CVSS base score of 8.8 has been assigned.

Jul 11, 2024 at 4:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-39904. See article

Jul 11, 2024 at 4:22 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Jul 11, 2024 at 4:22 PM
Trending

This CVE started to trend in security discussions

Jul 12, 2024 at 8:21 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.2%)

Jul 12, 2024 at 10:05 AM
Trending

This CVE stopped trending in security discussions

Jul 12, 2024 at 10:36 PM
Static CVE Timeline Graph

Affected Systems

Vnote_project/vnote
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-13: Subverting Environment Variable Values
+null more

References

CVE-2024-39904
VNote is a note-taking platform. Prior to 3.18.1, a code execution vulnerability existed in VNote, which allowed an attacker to execute arbitrary programs on the victim's system. A crafted URI can be used in a note to perform this attack using file:/// as a link. For example, file:///C:/WINDOWS/system32/cmd.exe. This allows attackers to execute arbitrary programs by embedding a reference to a local executable file such as file:///C:/WINDOWS/system32/cmd.exe and file:///C:/WINDOWS/system32/calc.exe. This vulnerability can be exploited by creating and sharing specially crafted notes. An attacker could send a crafted note file and perform further attacks. This vulnerability is fixed in 3.18.1.

News

Update Wed Sep 11 22:31:15 UTC 2024
Update Wed Sep 11 22:31:15 UTC 2024
Update Tue Jul 23 14:35:20 UTC 2024
Update Tue Jul 23 14:35:20 UTC 2024
Security Bulletin 17 Jul 2024 - Cyber Security Agency of Singapore
Security Bulletin 17 Jul 2024 Cyber Security Agency of Singapore
CVE-2024–39904: Code Execution via file:/// in Vnote
I recently found a highly impactful vulnerability, that enabled attackers to gain arbitrary code execution using file:/// uri scheme which… Continue reading on Medium »
NA - CVE-2024-39904 - VNote is a note-taking platform. Prior to...
Prior to 3.18.1, a code execution vulnerability existed in VNote, which allowed an attacker to execute arbitrary programs on the victim's system. A crafted URI can be used in a note to perform this attack using file:/// as a link.
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI