An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
References
Link | Resource |
---|---|
https://github.com/ofirdagan/cross-domain-local-storage | Product |
https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-TargetOrigin-Magic-iframe | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-04-07 18:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-11610
Mitre link : CVE-2020-11610
CVE.ORG link : CVE-2020-11610
JSON object : View
Products Affected
cross_domain_local_storage_project
- cross_domain_local_storage
CWE
CWE-668
Exposure of Resource to Wrong Sphere