CVE-2024-14010

9.8 CRITICAL

📋 TL;DR

Typora 1.7.4 contains a command injection vulnerability in PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution. Users running Typora 1.7.4 are affected.

💻 Affected Systems

Products:
  • Typora
Versions: 1.7.4
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Typora 1.7.4 are vulnerable regardless of configuration. The vulnerability exists in the PDF export functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's computer, allowing data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive files, system configuration changes, or installation of malware.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions preventing system-wide compromise.

🌐 Internet-Facing: LOW (requires local access or social engineering to exploit)
🏢 Internal Only: HIGH (malicious insider or compromised user account could exploit this vulnerability)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction to access PDF export preferences and inject commands. Proof of concept is publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.5 or later

Vendor Advisory: http://www.typora.io

Restart Required: Yes

Instructions:

1. Open Typora. 2. Go to Help > Check for Updates. 3. Download and install version 1.7.5 or newer. 4. Restart Typora.

🔧 Temporary Workarounds

Disable PDF Export

all

Prevent use of the vulnerable PDF export functionality

Run with Restricted Privileges

all

Run Typora with limited user privileges to reduce impact

🧯 If You Can't Patch

  • Uninstall Typora 1.7.4 and use alternative markdown editors
  • Implement application whitelisting to prevent unauthorized command execution

🔍 How to Verify

Check if Vulnerable:

Check Typora version in Help > About. If version is 1.7.4, the system is vulnerable.

Check Version:

On Typora: Help > About

Verify Fix Applied:

Verify Typora version is 1.7.5 or newer in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution from Typora process
  • Suspicious PDF export operations with command-line parameters

Network Indicators:

  • Outbound connections from Typora to unexpected destinations

SIEM Query:

process_name:"Typora.exe" AND command_line:*cmd* OR command_line:*powershell* OR command_line:*bash*

🔗 References

📤 Share & Export