The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324 | Patch Third Party Advisory | 
| https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324 | Patch Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 04:10
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324 - Patch, Third Party Advisory | 
Information
                Published : 2018-12-31 23:29
Updated : 2025-05-06 15:15
NVD link : CVE-2018-6333
Mitre link : CVE-2018-6333
CVE.ORG link : CVE-2018-6333
JSON object : View
Products Affected
                - nuclide
