Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWM2YzQtam1xeC0zcjMz
Open Redirect in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
Permalink: https://github.com/advisories/GHSA-c6c4-jmqx-3r33JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWM2YzQtam1xeC0zcjMz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 3 years ago
Updated: almost 2 years ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00144
EPSS Percentile: 0.50762
Identifiers: GHSA-c6c4-jmqx-3r33, CVE-2020-11611
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-11611
- https://github.com/ofirdagan/cross-domain-local-storage
- https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client
- https://github.com/advisories/GHSA-c6c4-jmqx-3r33
Blast Radius: 4.3
Affected Packages
npm:xdLocalStorage
Dependent packages: 1Dependent repositories: 5
Downloads: 672 last month
Affected Version Ranges: <= 2.0.5
No known fixed version
All affected versions: 2.0.3, 2.0.4, 2.0.5