An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
References
Link | Resource |
---|---|
https://github.com/ofirdagan/cross-domain-local-storage/pull/19 | Patch Third Party Advisory |
https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client | Exploit Third Party Advisory |
https://github.com/ofirdagan/cross-domain-local-storage/issues/17 | Patch Third Party Advisory |
https://github.com/ofirdagan/cross-domain-local-storage | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-04-07 11:15
Updated : 2020-04-08 08:45
NVD link : CVE-2015-9545
Mitre link : CVE-2015-9545
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
cross_domain_local_storage_project
- cross_domain_local_storage