CWE-1022
Use of Web Link to Untrusted Target with window.opener Access
The web application produces links to untrusted external sites outside of its sphere of control, but it does not properly prevent the external site from modifying security-critical properties of the window.opener object, such as the location property.
CVE-2018-25058 (GCVE-0-2018-25058)
Vulnerability from cvelistv5
Published
2022-12-29 07:56
Modified
2024-08-05 12:26
Severity ?
4.2 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
4.2 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
4.2 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Twitter-Post-Fetcher |
Version: 17.x |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:26:39.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://vuldb.com/?id.217017" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.217017" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/pull/170" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "modules": [ "Link Target Handler" ], "product": "Twitter-Post-Fetcher", "vendor": "n/a", "versions": [ { "status": "affected", "version": "17.x" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Twitter-Post-Fetcher bis 17.x entdeckt. Sie wurde als problematisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei js/twitterFetcher.js der Komponente Link Target Handler. Durch das Beeinflussen mit unbekannten Daten kann eine use of web link to untrusted target with window.opener access-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Ein Aktualisieren auf die Version 18.0.0 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-29T07:56:13.976Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.217017" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.217017" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/pull/170" }, { "tags": [ "patch" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3" }, { "tags": [ "patch" ], "url": "https://github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0" } ], "timeline": [ { "lang": "en", "time": "2022-12-29T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2022-12-29T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2022-12-29T09:01:10.000Z", "value": "VulDB last update" } ], "title": "Twitter-Post-Fetcher Link Target twitterFetcher.js reverse tabnabbing" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2018-25058", "datePublished": "2022-12-29T07:56:13.976Z", "dateReserved": "2022-12-29T07:54:07.873Z", "dateUpdated": "2024-08-05T12:26:39.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-25089 (GCVE-0-2018-25089)
Vulnerability from cvelistv5
Published
2023-08-28 12:31
Modified
2024-09-30 17:50
Severity ?
3.5 (Low) - CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
3.5 (Low) - CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
A vulnerability was found in glb Meetup Tag Extension 0.1 on MediaWiki. It has been rated as problematic. This issue affects some unknown processing of the component Link Attribute Handler. The manipulation leads to use of web link to untrusted target with window.opener access. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 850c726d6bbfe0bf270801fbb92a30babea4155c. It is recommended to upgrade the affected component. The identifier VDB-238157 was assigned to this vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
glb | Meetup Tag Extension |
Version: 0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:33:47.884Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.238157" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.238157" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/glb/mediawiki-tag-extension-meetup/commit/850c726d6bbfe0bf270801fbb92a30babea4155c" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/glb/mediawiki-tag-extension-meetup/releases/tag/v0.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-25089", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T17:49:57.600187Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T17:50:45.123Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "Link Attribute Handler" ], "product": "Meetup Tag Extension", "vendor": "glb", "versions": [ { "status": "affected", "version": "0.1" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in glb Meetup Tag Extension 0.1 on MediaWiki. It has been rated as problematic. This issue affects some unknown processing of the component Link Attribute Handler. The manipulation leads to use of web link to untrusted target with window.opener access. Upgrading to version 0.2 is able to address this issue. The identifier of the patch is 850c726d6bbfe0bf270801fbb92a30babea4155c. It is recommended to upgrade the affected component. The identifier VDB-238157 was assigned to this vulnerability." }, { "lang": "de", "value": "Eine Schwachstelle wurde in glb Meetup Tag Extension 0.1 f\u00fcr MediaWiki ausgemacht. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Link Attribute Handler. Durch das Manipulieren mit unbekannten Daten kann eine use of web link to untrusted target with window.opener access-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 0.2 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 850c726d6bbfe0bf270801fbb92a30babea4155c bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 2.7, "vectorString": "AV:A/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T12:43:24.091Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.238157" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.238157" }, { "tags": [ "patch" ], "url": "https://github.com/glb/mediawiki-tag-extension-meetup/commit/850c726d6bbfe0bf270801fbb92a30babea4155c" }, { "tags": [ "patch" ], "url": "https://github.com/glb/mediawiki-tag-extension-meetup/releases/tag/v0.2" } ], "timeline": [ { "lang": "en", "time": "2018-02-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2018-02-22T00:00:00.000Z", "value": "Countermeasure disclosed" }, { "lang": "en", "time": "2023-08-26T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-08-26T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-09-20T17:26:00.000Z", "value": "VulDB entry last update" } ], "title": "glb Meetup Tag Extension Link Attribute reverse tabnabbing" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2018-25089", "datePublished": "2023-08-28T12:31:04.889Z", "dateReserved": "2023-08-26T20:13:13.681Z", "dateUpdated": "2024-09-30T17:50:45.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-36624 (GCVE-0-2020-36624)
Vulnerability from cvelistv5
Published
2022-12-22 00:00
Modified
2024-08-04 17:30
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ahorner | text-helpers |
Version: 1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "technical-description", "vdb-entry", "x_transferred" ], "url": "https://vuldb.com/?id.216520" }, { "tags": [ "related", "x_transferred" ], "url": "https://github.com/ahorner/text-helpers/pull/19" }, { "tags": [ "mitigation", "patch", "x_transferred" ], "url": "https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3" }, { "tags": [ "mitigation", "x_transferred" ], "url": "https://github.com/ahorner/text-helpers/releases/tag/v1.1.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "text-helpers", "vendor": "ahorner", "versions": [ { "status": "affected", "version": "1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520." }, { "lang": "de", "value": "In ahorner text-helpers bis 1.0.x wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Es geht um eine nicht n\u00e4her bekannte Funktion der Datei lib/text_helpers/translation.rb. Durch das Manipulieren des Arguments link mit unbekannten Daten kann eine use of web link to untrusted target with window.opener access-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.1.0 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 184b60ded0e43c985788582aca2d1e746f9405a3 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-24T21:14:46.002Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "technical-description", "vdb-entry" ], "url": "https://vuldb.com/?id.216520" }, { "tags": [ "related" ], "url": "https://github.com/ahorner/text-helpers/pull/19" }, { "tags": [ "mitigation", "patch" ], "url": "https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3" }, { "tags": [ "mitigation" ], "url": "https://github.com/ahorner/text-helpers/releases/tag/v1.1.0" } ], "timeline": [ { "lang": "en", "time": "2022-12-22T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2022-12-22T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2022-12-24T14:53:18.000Z", "value": "VulDB last update" } ], "title": "ahorner text-helpers translation.rb reverse tabnabbing" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2020-36624", "datePublished": "2022-12-22T00:00:00", "dateReserved": "2022-12-22T00:00:00", "dateUpdated": "2024-08-04T17:30:08.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33697 (GCVE-0-2021-33697)
Vulnerability from cvelistv5
Published
2021-09-15 18:01
Modified
2024-08-03 23:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target (Reverse Tabnabbing)
Summary
Under certain conditions, SAP BusinessObjects Business Intelligence Platform (SAPUI5), versions - 420, 430, can allow an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SAP SE | SAP BusinessObjects Business Intelligence Platform (SAPUI5) |
Version: < 420 Version: < 430 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:58:22.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3063048" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP BusinessObjects Business Intelligence Platform (SAPUI5)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 420" }, { "status": "affected", "version": "\u003c 430" } ] } ], "descriptions": [ { "lang": "en", "value": "Under certain conditions, SAP BusinessObjects Business Intelligence Platform (SAPUI5), versions - 420, 430, can allow an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022: Use of Web Link to Untrusted Target (Reverse Tabnabbing)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T18:01:46", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3063048" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2021-33697", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP BusinessObjects Business Intelligence Platform (SAPUI5)", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "420" }, { "version_name": "\u003c", "version_value": "430" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Under certain conditions, SAP BusinessObjects Business Intelligence Platform (SAPUI5), versions - 420, 430, can allow an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." } ] }, "impact": { "cvss": { "baseScore": "4.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1022: Use of Web Link to Untrusted Target (Reverse Tabnabbing)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "name": "https://launchpad.support.sap.com/#/notes/3063048", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3063048" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2021-33697", "datePublished": "2021-09-15T18:01:46", "dateReserved": "2021-05-28T00:00:00", "dateUpdated": "2024-08-03T23:58:22.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-39112 (GCVE-0-2021-39112)
Vulnerability from cvelistv5
Published
2021-08-25 02:30
Modified
2024-10-11 17:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Atlassian | Jira Server |
Version: unspecified < 8.5.15 Version: 8.6.0 < unspecified Version: unspecified < 8.13.7 Version: 8.14.0 < unspecified Version: unspecified < 8.17.1 Version: 8.18.0 < unspecified Version: unspecified < 8.18.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:17.761Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-72433" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-39112", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:19:48.107549Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T17:19:59.439Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.5.15", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.17.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.18.0", "versionType": "custom" }, { "lessThan": "8.18.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.5.15", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.6.0", "versionType": "custom" }, { "lessThan": "8.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.17.1", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.18.0", "versionType": "custom" }, { "lessThan": "8.18.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022: Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-25T02:30:10", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-72433" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2021-08-24T00:00:00", "ID": "CVE-2021-39112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.5.15" }, { "version_affected": "\u003e=", "version_value": "8.6.0" }, { "version_affected": "\u003c", "version_value": "8.13.7" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.17.1" }, { "version_affected": "\u003e=", "version_value": "8.18.0" }, { "version_affected": "\u003c", "version_value": "8.18.1" } ] } }, { "product_name": "Jira Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.5.15" }, { "version_affected": "\u003e=", "version_value": "8.6.0" }, { "version_affected": "\u003c", "version_value": "8.13.7" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.17.1" }, { "version_affected": "\u003e=", "version_value": "8.18.0" }, { "version_affected": "\u003c", "version_value": "8.18.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Affected versions of Atlassian Jira Server and Data Center allow remote attackers to redirect users to a malicious URL via a reverse tabnapping vulnerability in the Project Shortcuts feature. The affected versions are before version 8.5.15, from version 8.6.0 before 8.13.7, from version 8.14.0 before 8.17.1, and from version 8.18.0 before 8.18.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1022: Use of Web Link to Untrusted Target with window.opener Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/JRASERVER-72433", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-72433" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2021-39112", "datePublished": "2021-08-25T02:30:10.338013Z", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-10-11T17:19:59.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-1583 (GCVE-0-2022-1583)
Vulnerability from cvelistv5
Published
2022-05-30 08:36
Modified
2024-08-03 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
The External Links in New Window / New Tab WordPress plugin before 1.43 does not ensure window.opener is set to "null" when links to external sites are clicked, which may enable tabnabbing attacks to occur.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | External Links in New Window / New Tab |
Version: 1.43 < 1.43 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:10:03.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "External Links in New Window / New Tab", "vendor": "Unknown", "versions": [ { "lessThan": "1.43", "status": "affected", "version": "1.43", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Daniel Ruf" } ], "descriptions": [ { "lang": "en", "value": "The External Links in New Window / New Tab WordPress plugin before 1.43 does not ensure window.opener is set to \"null\" when links to external sites are clicked, which may enable tabnabbing attacks to occur." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-30T08:36:03", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9" } ], "source": { "discovery": "EXTERNAL" }, "title": "External Links in New Window / New Tab \u003c 1.43 - Tabnabbing", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-1583", "STATE": "PUBLIC", "TITLE": "External Links in New Window / New Tab \u003c 1.43 - Tabnabbing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "External Links in New Window / New Tab", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.43", "version_value": "1.43" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Daniel Ruf" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The External Links in New Window / New Tab WordPress plugin before 1.43 does not ensure window.opener is set to \"null\" when links to external sites are clicked, which may enable tabnabbing attacks to occur." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/aa9d727c-4d17-4220-b8cb-e6dec30361a9" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-1583", "datePublished": "2022-05-30T08:36:03", "dateReserved": "2022-05-04T00:00:00", "dateUpdated": "2024-08-03T00:10:03.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2600 (GCVE-0-2022-2600)
Vulnerability from cvelistv5
Published
2022-08-22 15:05
Modified
2024-08-03 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Auto-hyperlink URLs |
Version: 5.4.1 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:46:03.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/01bbdefd-bdc3-43ef-9f35-6e7ebe786be2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Auto-hyperlink URLs", "vendor": "Unknown", "versions": [ { "lessThanOrEqual": "5.4.1", "status": "affected", "version": "5.4.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Daniel Ruf" } ], "descriptions": [ { "lang": "en", "value": "The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel=\"noopener noreferer\" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-22T15:05:12", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/01bbdefd-bdc3-43ef-9f35-6e7ebe786be2" } ], "source": { "discovery": "EXTERNAL" }, "title": "Auto-hyperlink URLs \u003c= 5.4.1 - Tab Nabbing", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-2600", "STATE": "PUBLIC", "TITLE": "Auto-hyperlink URLs \u003c= 5.4.1 - Tab Nabbing" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Auto-hyperlink URLs", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "5.4.1", "version_value": "5.4.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Daniel Ruf" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel=\"noopener noreferer\" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/01bbdefd-bdc3-43ef-9f35-6e7ebe786be2", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/01bbdefd-bdc3-43ef-9f35-6e7ebe786be2" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-2600", "datePublished": "2022-08-22T15:05:12", "dateReserved": "2022-08-01T00:00:00", "dateUpdated": "2024-08-03T00:46:03.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-4927 (GCVE-0-2022-4927)
Vulnerability from cvelistv5
Published
2023-03-05 20:00
Modified
2024-08-03 01:55
Severity ?
5.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
5.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The patch is named abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
ualbertalib | NEOSDiscovery |
Version: 1.0.70 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:46.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.222287" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.222287" }, { "tags": [ "issue-tracking", "x_transferred" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/pull/547" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/commit/abe9f57123e0c278ae190cd7402a623d66c51375" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/releases/tag/1.0.71" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NEOSDiscovery", "vendor": "ualbertalib", "versions": [ { "status": "affected", "version": "1.0.70" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ualbertalib NEOSDiscovery 1.0.70 and classified as problematic. This issue affects some unknown processing of the file app/views/bookmarks/_refworks.html.erb. The manipulation leads to use of web link to untrusted target with window.opener access. The attack may be initiated remotely. Upgrading to version 1.0.71 is able to address this issue. The patch is named abe9f57123e0c278ae190cd7402a623d66c51375. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222287." }, { "lang": "de", "value": "Eine problematische Schwachstelle wurde in ualbertalib NEOSDiscovery 1.0.70 gefunden. Dies betrifft einen unbekannten Teil der Datei app/views/bookmarks/_refworks.html.erb. Durch Beeinflussen mit unbekannten Daten kann eine use of web link to untrusted target with window.opener access-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Ein Aktualisieren auf die Version 1.0.71 vermag dieses Problem zu l\u00f6sen. Der Patch wird als abe9f57123e0c278ae190cd7402a623d66c51375 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T14:35:40.134Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.222287" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.222287" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/pull/547" }, { "tags": [ "patch" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/commit/abe9f57123e0c278ae190cd7402a623d66c51375" }, { "tags": [ "patch" ], "url": "https://github.com/ualbertalib/NEOSDiscovery/releases/tag/1.0.71" } ], "timeline": [ { "lang": "en", "time": "2023-03-03T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2023-03-03T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-03-03T01:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-03-31T09:29:25.000Z", "value": "VulDB entry last update" } ], "title": "ualbertalib NEOSDiscovery _refworks.html.erb reverse tabnabbing" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2022-4927", "datePublished": "2023-03-05T20:00:05.181Z", "dateReserved": "2023-03-03T16:47:20.643Z", "dateUpdated": "2024-08-03T01:55:46.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39727 (GCVE-0-2024-39727)
Vulnerability from cvelistv5
Published
2024-12-25 13:59
Modified
2024-12-26 18:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
IBM | Engineering Insights |
Version: 7.0.2, 7.0.3 cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:ibm:engineering_insights:7.0.3:*:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39727", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-26T18:11:33.608851Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-26T18:11:41.366Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_insights:7.0.3:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Engineering Insights", "vendor": "IBM", "versions": [ { "status": "affected", "version": "7.0.2, 7.0.3" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003euses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims\u2019 web browser.\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3\u00a0uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims\u2019 web browser." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-25T13:59:06.713Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "url": "https://www.ibm.com/support/pages/node/7176783" } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Engineering Lifecycle Optimization - Engineering Insights tabnabbing", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2024-39727", "datePublished": "2024-12-25T13:59:06.713Z", "dateReserved": "2024-06-28T09:34:20.322Z", "dateUpdated": "2024-12-26T18:11:41.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-33014 (GCVE-0-2025-33014)
Vulnerability from cvelistv5
Published
2025-07-18 18:51
Modified
2025-08-18 01:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1022 - Use of Web Link to Untrusted Target with window.opener Access
Summary
IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | IBM | Sterling B2B Integrator |
Version: 6.0.0.0 ≤ 6.1.2.7 Version: 6.2.0.0 ≤ 6.2.0.4 cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.7:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.4:*:*:*:*:*:*:* |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-33014", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-22T14:51:57.653379Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-22T14:52:03.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_b2b_integrator:6.1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.4:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Sterling B2B Integrator", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "6.1.2.7", "status": "affected", "version": "6.0.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.0.4", "status": "affected", "version": "6.2.0.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:ibm:sterling_file_gateway:6.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.1.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:sterling_file_gateway:6.2.0.4:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Sterling File Gateway", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "6.1.2.7", "status": "affected", "version": "6.0.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.0.4", "status": "affected", "version": "6.2.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4\u0026nbsp;uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims\u2019 web browser." } ], "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7 and 6.2.0.0 through 6.2.0.4\u00a0uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims\u2019 web browser." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1022", "description": "CWE-1022 Use of Web Link to Untrusted Target with window.opener Access", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-18T01:33:59.946Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7240065" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 - 6.1.2.7 IT47893 Apply B2Bi 6.1.2.7_1. 6.2.0.5 or 6.2.1.0\u003cbr\u003eIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.2.0.0 - 6.2.0.4 IT47893 Apply B2Bi 6.2.0.5 or 6.2.1.0\u003cbr\u003e \u003cbr\u003e\u003cbr\u003eThe IIM versions of 6.1.2.7_1, 6.2.0.5 and 6.2.1.0 are available on Fix Central. \u003cbr\u003e\u003cbr\u003eThe container version of 6.1.2.7_1, 6.2.0.5 and 6.2.1.0 are available in IBM Entitled Registry.\u003cbr\u003e" } ], "value": "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 - 6.1.2.7 IT47893 Apply B2Bi 6.1.2.7_1. 6.2.0.5 or 6.2.1.0\nIBM Sterling B2B Integrator and IBM Sterling File Gateway 6.2.0.0 - 6.2.0.4 IT47893 Apply B2Bi 6.2.0.5 or 6.2.1.0\n \n\nThe IIM versions of 6.1.2.7_1, 6.2.0.5 and 6.2.1.0 are available on Fix Central. \n\nThe container version of 6.1.2.7_1, 6.2.0.5 and 6.2.1.0 are available in IBM Entitled Registry." } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Sterling B2B Integrator and IBM Sterling File Gateway link injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-33014", "datePublished": "2025-07-18T18:51:05.486Z", "dateReserved": "2025-04-15T09:48:51.520Z", "dateUpdated": "2025-08-18T01:33:59.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Specify in the design that any linked external document must not be granted access to the location object of the calling page.
Mitigation
Phase: Implementation
Description:
- When creating a link to an external document using the <a> tag with a defined target, for example "_blank" or a named frame, provide the rel attribute with a value "noopener noreferrer".
- If opening the external document in a new window via javascript, then reset the opener by setting it equal to null.
Mitigation
Phase: Implementation
Description:
- Do not use "_blank" targets. However, this can affect the usability of the application.
No CAPEC attack patterns related to this CWE.