Описание
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
Ссылки
- ProductThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-ClientExploitThird Party Advisory
- ProductThird Party Advisory
- PatchThird Party Advisory
- PatchThird Party Advisory
- https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-ClientExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.5 (включая)
cpe:2.3:a:cross_domain_local_storage_project:cross_domain_local_storage:*:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00449
Низкий
7.1 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
EPSS
Процентиль: 63%
0.00449
Низкий
7.1 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-20