{ "id": "CVE-2022-25224", "sourceIdentifier": "help@fluidattacks.com", "published": "2022-05-20T12:15:10.883", "lastModified": "2024-11-21T06:51:50.187", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Proton v0.2.0 allows an attacker to create a malicious link inside a markdown file. When the victim clicks the link, the application opens the site in the current frame allowing an attacker to host JavaScript code in the malicious link in order to trigger an XSS attack. The 'nodeIntegration' configuration is set to on which allows the 'webpage' to use 'NodeJs' features, an attacker can leverage this to run OS commands." }, { "lang": "es", "value": "Proton versi\u00f3n v0.2.0, permite a un atacante crear un enlace malicioso dentro de un archivo markdown. Cuando la v\u00edctima hace clic en el enlace, la aplicaci\u00f3n abre el sitio en el marco actual permitiendo a un atacante alojar c\u00f3digo JavaScript en el enlace malicioso para desencadenar un ataque de tipo XSS. La configuraci\u00f3n \"nodeIntegration\" est\u00e1 habilitada, lo que permite a la p\u00e1gina web usar las caracter\u00edsticas de \"NodeJs\", un atacante puede aprovechar esto para ejecutar comandos del Sistema Operativo" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "baseScore": 3.5, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:proton_project:proton:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9AF0DFCA-0F88-437E-8E07-F223ED15C4B8" } ] } ] } ], "references": [ { "url": "https://fluidattacks.com/advisories/lennon/", "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://fluidattacks.com/advisories/lennon/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }