Notesnook vulnerable to RCE via stored XSS in Web Clipper rendering
Platform
other
Component
notesnook
Fixed in
3.3.11
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.
How to fix
Actualice Notesnook Web/Desktop a la versión 3.3.11 o superior, y Notesnook Android/iOS a la versión 3.3.17 o superior. Esto corrige la vulnerabilidad XSS almacenada en el renderizado de Web Clipper que podría permitir la ejecución remota de código.
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free