Lucene search

K
cve[email protected]CVE-2023-5718
HistoryOct 23, 2023 - 3:15 p.m.

CVE-2023-5718

2023-10-2315:15:09
CWE-346
CWE-200
web.nvd.nist.gov
29
vue.js
devtools
security
leak
screenshot
data
cve-2023-5718
nvd

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

4.6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard postMessage() API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.

Affected configurations

NVD
Node
vuejsdevtoolsMatch6.5.0node.js
CPENameOperatorVersion
vuejs:devtoolsvuejs devtoolseq6.5.0

CNA Affected

[
  {
    "product": "Vue.js devtools",
    "vendor": "Vue.js",
    "versions": [
      {
        "version": "< 6.5.1",
        "status": "affected"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

4.6 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-5718