Evernote fixes macOS app bug that allowed remote code execution

Social Media

Technology / Social Media 14 Views comments

Evernote has fastened a vulnerability that would have allowed an attacker to run malicious code on a sufferer’s pc.

Dhiraj Mishra, a safety researcher based mostly in Dubai, reported the bug to Evernote on March 17.  In a blog post displaying his proof-of-concept, Mishra confirmed TechCrunch that a consumer solely needed to click on a hyperlink masked as an internet handle, which might open a regionally saved app or file unhindered and with out warning.

Evernote spokesperson Shelby Busen confirmed the bug had been fastened, and stated the corporate “appreciates” the contributions from safety researchers.

The researcher ‘popped calc’ as a strategy to reveal a distant code execution bug in Evernote (Picture: provided)

MITRE, the vulnerability database keeper, issued an advisory beneath CVE-2019-10038.

The bug might permit an attacker to remotely run malicious instructions on any macOS pc with Evernote put in. Because the repair went into impact, Evernote now warns customers once they click on a hyperlink that opens a file on their Mac.

An identical native file path traversal bug was revealed Tuesday in Electronic Arts’ Origin gaming client.

Evernote was pressured to reset near 50 million passwords after a breach in 2013, and later triggered controversy by altering its privateness coverage that allowed employees to entry consumer knowledge. The corporate later walked back the coverage change after consumer complaints.