Description
An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4615 | An issue was discovered in xdLocalStorage through 2.0.5. The postData() function in xdLocalStoragePostMessageApi.js specifies the wildcard (*) as the targetOrigin when calling the postMessage() function on the parent object. Therefore any domain can load the application hosting the "magical iframe" and receive the messages that the "magical iframe" sends. |
Github GHSA |
GHSA-mr5m-2385-2vcp | xdlocalstorage does not verify request origin |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:35:13.412Z
Reserved: 2020-04-07T00:00:00.000Z
Link: CVE-2020-11610
No data.
Status : Modified
Published: 2020-04-07T18:15:13.587
Modified: 2024-11-21T04:58:14.287
Link: CVE-2020-11610
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA