Описание
Storybook is a frontend workshop for building user interface components and pages in isolation. Prior to versions 7.6.23, 8.6.17, 9.1.19, and 10.2.10, the WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability only affects the Storybook dev server; production builds are not impacted. Exploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction. If the Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly. The vulnerability affects the WebSocket message handlers for creating and saving stories. Both are vulnerable to injection via unsanitized input in the componentFilePath field, which can be exploited to achieve persistent XSS or Remote Code Execution (RCE). Versions 7.6.23, 8.6.17, 9.1.19, and 10.2.10 contain a fix for the issue.
A flaw was found in Storybook's development server. This vulnerability allows a remote attacker to achieve Remote Code Execution or persistent Cross-Site Scripting by exploiting WebSocket hijacking. The attack can occur if a developer visits a malicious website while their local Storybook development server is active, or directly by an unauthenticated attacker if the server is publicly accessible. This is due to insufficient validation of WebSocket connection origins and unsanitized input, leading to significant security risks.
Отчет
This vulnerability affects the Storybook development server, which is not intended for production deployments. Exploitation typically requires a developer to visit a malicious website while their local Storybook dev server is active. If the dev server is publicly exposed, unauthenticated attackers can directly interact with it, potentially leading to persistent cross-site scripting (XSS) or remote code execution (RCE). This primarily impacts development environments using Storybook within Red Hat AMQ, Red Hat Enterprise Linux, Red Hat In-Vehicle OS, and Community Projects.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | grafana | Not affected | ||
| Red Hat Enterprise Linux 9 | grafana | Not affected | ||
| streams for Apache Kafka 2 | com.github.streamshub-console | Affected | ||
| streams for Apache Kafka 3 | com.github.streamshub-console | Affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
8.8 High
CVSS3
Связанные уязвимости
Storybook is a frontend workshop for building user interface components and pages in isolation. Prior to versions 7.6.23, 8.6.17, 9.1.19, and 10.2.10, the WebSocket functionality in Storybook's dev server, used to create and update stories, is vulnerable to WebSocket hijacking. This vulnerability only affects the Storybook dev server; production builds are not impacted. Exploitation requires a developer to visit a malicious website while their local Storybook dev server is running. Because the WebSocket connection does not validate the origin of incoming connections, a malicious site can silently send WebSocket messages to the local instance without any further user interaction. If the Storybook dev server is intentionally exposed publicly (e.g. for design reviews or stakeholder demos) the risk is higher, as no malicious site visit is required. Any unauthenticated attacker can send WebSocket messages to it directly. The vulnerability affects the WebSocket message handlers for creating
8.8 High
CVSS3