Логотип exploitDog
bind:CVE-2020-11610
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-11610

Количество 2

Количество 2

nvd логотип

CVE-2020-11610

почти 6 лет назад

An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mr5m-2385-2vcp

больше 3 лет назад

xdlocalstorage does not verify request origin

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-11610

An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.

CVSS3: 8.8
0%
Низкий
почти 6 лет назад
github логотип
GHSA-mr5m-2385-2vcp

xdlocalstorage does not verify request origin

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу