cve/2019/CVE-2019-18426.md

27 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-18426](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18426)
![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20Desktop&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%200.3.9309%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')%20(CWE-79)&color=brighgreen)
### Description
A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message.
### POC
#### Reference
- http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html
#### Github
- https://github.com/0dayhunter/Facebook-BugBounty-Writeups
- https://github.com/0xT11/CVE-POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PerimeterX/CVE-2019-18426
- https://github.com/abhav/nvd_scrapper
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups
- https://github.com/weizman/weizman