In uBlock before 0.9.5.15, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.
References
Link | Resource |
---|---|
https://armin.dev/blog/2019/04/adblock-plus-code-injection/ | Exploit Mitigation Third Party Advisory |
https://news.ycombinator.com/item?id=19666504 | Third Party Advisory |
https://armin.dev/blog/2019/04/adblock-plus-code-injection/ | Exploit Mitigation Third Party Advisory |
https://news.ycombinator.com/item?id=19666504 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://armin.dev/blog/2019/04/adblock-plus-code-injection/ - Exploit, Mitigation, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=19666504 - Third Party Advisory |
Information
Published : 2019-04-29 15:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11595
Mitre link : CVE-2019-11595
CVE.ORG link : CVE-2019-11595
JSON object : View
Products Affected
ublockorigin
- ublock_origin
CWE
CWE-20
Improper Input Validation