An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-2595 An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
Github GHSA Github GHSA GHSA-vrc7-6g8w-jh56 Improper Input Validation in xdLocalStorage
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T08:51:05.314Z

Reserved: 2020-04-07T00:00:00

Link: CVE-2015-9544

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-07T18:15:13.180

Modified: 2024-11-21T02:40:53.617

Link: CVE-2015-9544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.