Description
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7.
Problem types
CWE-24: Path Traversal: '../filedir'
Product status
References
github.com/...joplin/security/advisories/GHSA-gcmj-c9gg-9vh6
github.com/...joplin/security/advisories/GHSA-gcmj-c9gg-9vh6
github.com/laurent22/joplin/pull/13736
github.com/...ommit/791668455e1aae50501ff57ea4783b3fba9d377c
github.com/...e-converter/renderer/src/page/embedded_file.rs
github.com/laurent22/joplin/releases/tag/v3.5.7