An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4615 | An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends. |
Github GHSA |
GHSA-mr5m-2385-2vcp | xdlocalstorage does not verify request origin |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:35:13.412Z
Reserved: 2020-04-07T00:00:00
Link: CVE-2020-11610
No data.
Status : Modified
Published: 2020-04-07T18:15:13.587
Modified: 2024-11-21T04:58:14.287
Link: CVE-2020-11610
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA