2024-12-08 03:06:42 +00:00

123 lines
3.5 KiB
JSON

{
"id": "CVE-2022-24072",
"sourceIdentifier": "cve@navercorp.com",
"published": "2022-03-17T06:15:06.627",
"lastModified": "2024-11-21T06:49:46.170",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The devtools API in Whale browser before 3.12.129.18 allowed extension developers to inject arbitrary JavaScript into the extension store web page via devtools.inspectedWindow, leading to extensions downloading and uploading when users open the developer tool."
},
{
"lang": "es",
"value": "La API devtools en Whale browser versiones anteriores a 3.12.129.18, permit\u00eda a desarrolladores de extensiones inyectar JavaScript arbitrario en la p\u00e1gina web de la tienda de extensiones por medio de devtools.inspectedWindow, conllevando a una descarga y carga de extensiones cuando los usuarios abr\u00edan la herramienta para desarrolladores"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "cve@navercorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:navercorp:whale:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.12.129.18",
"matchCriteriaId": "47138F1B-655D-4459-905C-7BFA3A326DC5"
}
]
}
]
}
],
"references": [
{
"url": "https://cve.naver.com/detail/cve-2022-24072",
"source": "cve@navercorp.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://cve.naver.com/detail/cve-2022-24072",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}