An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
References
Link | Resource |
---|---|
https://github.com/ofirdagan/cross-domain-local-storage | Product Third Party Advisory |
https://github.com/ofirdagan/cross-domain-local-storage/issues/17 | Patch Third Party Advisory |
https://github.com/ofirdagan/cross-domain-local-storage/pull/19 | Patch Third Party Advisory |
https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-04-07 18:15
Updated : 2024-02-04 21:00
NVD link : CVE-2015-9545
Mitre link : CVE-2015-9545
CVE.ORG link : CVE-2015-9545
JSON object : View
Products Affected
cross_domain_local_storage_project
- cross_domain_local_storage
CWE
CWE-20
Improper Input Validation