Add CVE-2022-24762 for GHSA-4vvg-x86p-mvqc

Add CVE-2022-24762 for GHSA-4vvg-x86p-mvqc
This commit is contained in:
advisory-database[bot] 2022-03-14 22:47:18 +00:00 committed by GitHub
parent 10ebd9d4ba
commit 867863449a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,18 +1,98 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2022-24762",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"STATE": "PUBLIC",
"TITLE": "Exposure of Sensitive Information to an Unauthorized Actor in sysend.js"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "sysend.js",
"version": {
"version_data": [
{
"version_value": "< 1.10.0"
}
]
}
}
]
},
"vendor_name": "jcubic"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messages."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc",
"refsource": "CONFIRM",
"url": "https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc"
},
{
"name": "https://github.com/jcubic/sysend.js/issues/33",
"refsource": "MISC",
"url": "https://github.com/jcubic/sysend.js/issues/33"
},
{
"name": "https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a",
"refsource": "MISC",
"url": "https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a"
},
{
"name": "https://github.com/jcubic/sysend.js/releases/tag/1.10.0",
"refsource": "MISC",
"url": "https://github.com/jcubic/sysend.js/releases/tag/1.10.0"
}
]
},
"source": {
"advisory": "GHSA-4vvg-x86p-mvqc",
"discovery": "UNKNOWN"
}
}