Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2020-35717 PoC — Zonetti Zonote 跨站脚本漏洞

Source
Associated Vulnerability
Title:Zonetti Zonote 跨站脚本漏洞 (CVE-2020-35717)
Description:zonote through 0.4.0 allows XSS via a crafted note, with resultant Remote Code Execution (because nodeIntegration in webPreferences is true).
Description
Showcase repository for CVE-2020-35717
Readme
# CVE-2020–35717

[zonote](https://github.com/zonetti/zonote) allows XSS via crafted note, with resultant Remote Code Execution (because Node.js integration is enabled).

## Steps to exploit the vulnerability

- Download any zonote [affected version](https://github.com/zonetti/zonote/releases/tag/v0.4.0)
- Open zonote app
- Import [xss-rce.znt](./xss-rce.znt) in zonote via Menu > Open
- Hover over the different links in imported notes

<img src="./xss-rce.gif" width="95%">

## Disclosure Timeline

- 2020-12-26 Issue discovered and contact with the owner
- 2020-12-26 Owner express his intention of not maintaining the repository nor fixing the vulnerability
- 2021-01-01 Public disclosure of the vulnerability
File Snapshot

[4.0K] /data/pocs/e409a5dc443f21e8e6f0c0bd8ca5b5d2b7197f57 ├── [ 718] README.md ├── [1.5M] xss-rce.gif └── [ 745] xss-rce.znt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →