Vulnerability CVE-2022-24762


Published: 2022-03-14   Modified: 2022-03-15

Description:
sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messages.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Sysend.js project -> Sysend.js 

 References:
https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc
https://github.com/jcubic/sysend.js/releases/tag/1.10.0
https://github.com/jcubic/sysend.js/issues/33
https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a

Copyright 2024, cxsecurity.com

 

Back to Top