Arc before 2024-08-26 allows remote code execution in JavaScript boosts. Boosts that run JavaScript cannot be shared by default; however (because of misconfigured Firebase ACLs), it is possible to create or update a boost using another user's ID. This installs the boost in the victim's browser and runs arbitrary Javascript on that browser in a privileged context. NOTE: this is a no-action cloud vulnerability with zero affected users.
References
Configurations
No configuration.
History
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) Arc before 2024-08-26 allows remote code execution in JavaScript boosts. Boosts that run JavaScript cannot be shared by default; however (because of misconfigured Firebase ACLs), it is possible to create or update a boost using another user's ID. This installs the boost in the victim's browser and runs arbitrary Javascript on that browser in a privileged context. NOTE: this is a no-action cloud vulnerability with zero affected users. |
20 Sep 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-284 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
20 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-20 17:15
Updated : 2024-09-26 13:32
NVD link : CVE-2024-45489
Mitre link : CVE-2024-45489
CVE.ORG link : CVE-2024-45489
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control