cve/2023/CVE-2023-5718.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-5718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5718)
![](https://img.shields.io/static/v1?label=Product&message=Vue.js%20devtools&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%206.5.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&color=brighgreen)
### Description
The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.
### POC
#### Reference
- https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb
2024-06-09 00:33:16 +00:00
- https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.