CVE-2023-31874

8.8 HIGH

📋 TL;DR

CVE-2023-31874 is a critical vulnerability in Yank Note 3.52.1 that allows arbitrary code execution when a malicious file is opened. Attackers can exploit this to run commands on the victim's system through the nodeRequire('child_process') function. Users of Yank Note version 3.52.1 are affected.

💻 Affected Systems

Products:
  • Yank Note
Versions: 3.52.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in the default installation and requires only that a user opens a malicious file with the vulnerable version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the victim's machine, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files, installation of malware, or credential harvesting from the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing, restricted user permissions, and network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open a crafted file. Public proof-of-concept demonstrates the vulnerability via Packet Storm references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.52.2 or later

Vendor Advisory: https://github.com/purocean/yn/releases

Restart Required: Yes

Instructions:

1. Backup your Yank Note data. 2. Download the latest version from the official GitHub repository. 3. Uninstall the current version. 4. Install the updated version. 5. Restart Yank Note.

🔧 Temporary Workarounds

Disable file opening from untrusted sources

all

Prevent opening files from unknown or untrusted sources in Yank Note.

Run Yank Note with restricted permissions

all

Run the application with limited user privileges to reduce impact if exploited.

🧯 If You Can't Patch

  • Discontinue use of Yank Note until patched and use alternative note-taking applications.
  • Implement application whitelisting to prevent execution of unauthorized processes from Yank Note.

🔍 How to Verify

Check if Vulnerable:

Check Yank Note version in application settings or via 'Help > About'. If version is 3.52.1, the system is vulnerable.

Check Version:

Check version in Yank Note GUI under 'Help > About' or look for version information in application files.

Verify Fix Applied:

After updating, verify the version is 3.52.2 or later in 'Help > About'.

📡 Detection & Monitoring

Log Indicators:

  • Unusual child process spawns from Yank Note executable
  • Suspicious file access patterns in Yank Note logs

Network Indicators:

  • Unexpected outbound connections from Yank Note process
  • Command and control traffic originating from Yank Note

SIEM Query:

process_name:"Yank Note" AND (process_command_line:"child_process" OR process_command_line:"nodeRequire")

🔗 References

📤 Share & Export