Lucene search

K
githubGitHub Advisory DatabaseGHSA-M688-CX2P-RGQ9
HistoryDec 29, 2022 - 9:30 a.m.

Twitter-Post-Fetcher vulnerable to Use of Web Link to Untrusted Target with window.opener Access

2022-12-2909:30:19
CWE-1022
GitHub Advisory Database
github.com
18
twitter-post-fetcher
untrusted link
web link
window.opener access
remote attack
upgrade
patch
vdb-217017

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

48.3%

A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 can address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.

Affected configurations

Vulners
Node
twitter-post-fetcher_projecttwitter-post-fetcherRange<18.0.0
VendorProductVersionCPE
twitter-post-fetcher_projecttwitter-post-fetcher*cpe:2.3:a:twitter-post-fetcher_project:twitter-post-fetcher:*:*:*:*:*:*:*:*

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

48.3%

Related for GHSA-M688-CX2P-RGQ9