CVE-2020-11610

An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cross_domain_local_storage_project:cross_domain_local_storage:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () https://github.com/ofirdagan/cross-domain-local-storage - Product () https://github.com/ofirdagan/cross-domain-local-storage - Product
References () https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe - Exploit, Third Party Advisory () https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe - Exploit, Third Party Advisory

Information

Published : 2020-04-07 18:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11610

Mitre link : CVE-2020-11610

CVE.ORG link : CVE-2020-11610


JSON object : View

Products Affected

cross_domain_local_storage_project

  • cross_domain_local_storage
CWE
CWE-668

Exposure of Resource to Wrong Sphere