Vulnerability Description
Omni-notes is an open source note-taking application for Android. The Omni-notes Android app had an insufficient path validation vulnerability when displaying the details of a note received through an externally-provided intent. The paths of the note's attachments were not properly validated, allowing malicious or compromised applications in the same device to force Omni-notes to copy files from its internal storage to its external storage directory, where they would have become accessible to any component with permission to read the external storage. Updating to the newest version (6.2.7) of Omni-notes Android fixes this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Omninotes | Omni Notes | <= 6.2.6 |
Related Weaknesses (CWE)
References
- https://github.com/federicoiosue/Omni-Notes/security/advisories/GHSA-g38r-4cf6-3Vendor Advisory
- https://github.com/federicoiosue/Omni-Notes/security/advisories/GHSA-g38r-4cf6-3Vendor Advisory
FAQ
What is CVE-2023-33188?
CVE-2023-33188 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Omni-notes is an open source note-taking application for Android. The Omni-notes Android app had an insufficient path validation vulnerability when displaying the details of a note received through an...
How severe is CVE-2023-33188?
CVE-2023-33188 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33188?
Check the references section above for vendor advisories and patch information. Affected products include: Omninotes Omni Notes.