Untriaged
Vikunja Desktop allows arbitrary local application invocation via unvalidated shell.openExternal
Vikunja is an open-source self-hosted task management platform. Starting in version 0.21.0 and prior to version 2.2.0, the Vikunja Desktop Electron wrapper passes URLs from `window.open()` calls directly to `shell.openExternal()` without any validation or protocol allowlisting. An attacker who can place a link with `target="_blank"` (or that otherwise triggers `window.open`) in user-generated content can cause the victim's operating system to open arbitrary URI schemes, invoking local applications, opening local files, or triggering custom protocol handlers. Version 2.2.0 patches the issue.
References
-
https://github.com/go-vikunja/vikunja/security/advisories/GHSA-6q44-85gc-cjvf x_refsource_CONFIRM
-
https://vikunja.io/changelog/vikunja-v2.2.0-was-released x_refsource_MISC
Affected products
vikunja
- ==>= 0.21.0, < 2.2.0
Matching in nixpkgs
pkgs.vikunja
Todo-app to organize your life
pkgs.vikunja-desktop
Desktop App of the Vikunja to-do list app
Package maintainers
-
@leona-ya Leona Maroni <nix@leona.is>