An issue was discovered in xdLocalStorage through 2.0.5. The buildMessage() function in xdLocalStorage.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the iframe object. Therefore any domain that is currently loaded within the iframe can receive the messages that the client sends.
References
| Link | Resource |
|---|---|
| https://github.com/ofirdagan/cross-domain-local-storage | Product Third Party Advisory |
| https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client | Exploit Third Party Advisory |
| https://github.com/ofirdagan/cross-domain-local-storage | Product Third Party Advisory |
| https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Client | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-04-07 18:15
Updated : 2024-11-21 04:58
NVD link : CVE-2020-11611
Mitre link : CVE-2020-11611
CVE.ORG link : CVE-2020-11611
JSON object : View
Products Affected
cross_domain_local_storage_project
- cross_domain_local_storage
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
