Description
An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4615 | An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends. |
Github GHSA |
GHSA-mr5m-2385-2vcp | xdlocalstorage does not verify request origin |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:35:13.412Z
Reserved: 2020-04-07T00:00:00.000Z
Link: CVE-2020-11610
No data.
Status : Modified
Published: 2020-04-07T18:15:13.587
Modified: 2024-11-21T04:58:14.287
Link: CVE-2020-11610
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA