{ "id": "CVE-2024-50346", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T00:15:04.510", "lastModified": "2024-11-05T16:04:26.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WebFeed is a lightweight web feed reader extension for Firefox/Chrome. Multiple HTML injection vulnerabilities in WebFeed can lead to CSRF and UI spoofing attacks. A remote attacker can provide malicious RSS feeds and attract the victim user to visit it using WebFeed. The attacker can then inject malicious HTML into the extension page and fool the victim into sending out HTTP requests to arbitrary sites with the victim's credentials. Users are vulnerable to CSRF attacks when visiting malicious RSS feeds via WebFeed. Unwanted actions could be executed on the user's behalf on arbitrary websites. This issue has been addressed in release version 0.9.2. All users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "WebFeed es una extensi\u00f3n ligera de lectura de feeds web para Firefox/Chrome. Varias vulnerabilidades de inyecci\u00f3n de HTML en WebFeed pueden provocar ataques de suplantaci\u00f3n de interfaz de usuario y CSRF. Un atacante remoto puede proporcionar feeds RSS maliciosos y atraer al usuario v\u00edctima para que los visite mediante WebFeed. El atacante puede entonces inyectar HTML malicioso en la p\u00e1gina de la extensi\u00f3n y enga\u00f1ar a la v\u00edctima para que env\u00ede solicitudes HTTP a sitios arbitrarios con las credenciales de la v\u00edctima. Los usuarios son vulnerables a ataques CSRF cuando visitan feeds RSS maliciosos a trav\u00e9s de WebFeed. Se podr\u00edan ejecutar acciones no deseadas en nombre del usuario en sitios web arbitrarios. Este problema se ha solucionado en la versi\u00f3n de lanzamiento 0.9.2. Se recomienda a todos los usuarios que actualicen. No existen soluciones alternativas conocidas para esta vulnerabilidad." } ], "metrics": { "cvssMetricV40": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "baseScore": 5.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "NONE", "userInteraction": "ACTIVE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "LOW", "subAvailabilityImpact": "NONE", "exploitMaturity": "NOT_DEFINED", "confidentialityRequirement": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "availabilityRequirement": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "Safety": "NOT_DEFINED", "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED" } } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "references": [ { "url": "https://github.com/taoso/webfeed/commit/a2d1c1c3a98f30e0bd7a1bbcb746fae484985e6d", "source": "security-advisories@github.com" }, { "url": "https://github.com/taoso/webfeed/security/advisories/GHSA-mrc7-2q3w-48j8", "source": "security-advisories@github.com" } ] }