mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
94 lines
5.2 KiB
JSON
94 lines
5.2 KiB
JSON
{
|
|
"id": "CVE-2025-25300",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2025-02-18T18:15:35.330",
|
|
"lastModified": "2025-02-18T19:15:28.957",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel=\"noopener\"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel=\"noopener\"` is imposed on all `target=\"_blank\"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "SmartBanner.js es un banner de aplicaciones inteligente personalizable para iOS y Android. Antes de la versi\u00f3n 1.14.1, haga clic en el enlace SmartBanner `View` y navegando a la p\u00e1gina de terceros de las hojas de` Window.opener` expuestas. Puede permitir que terceros hostiles abusen de `window.opener`, por ejemplo, mediante redirecci\u00f3n o inyecci\u00f3n en la p\u00e1gina original con SmartBanner. `rel =\" noopener \"` se pobla autom\u00e1ticamente en enlaces a partir de `v1.14.1`, que es una actualizaci\u00f3n recomendada para resolver la vulnerabilidad. Algunos workarounds est\u00e1n disponibles para aquellos que no pueden actualizar. Aseg\u00farese de que el enlace 'Ver' solo est\u00e9 llevando a los usuarios a App Store o Google Play Store, donde la seguridad est\u00e1 protegida por los respectivos equipos de seguridad de la tienda de aplicaciones. Si el enlace `View` va a una p\u00e1gina de terceros, limite SmartBanner.js para usarse en iOS que disminuye el alcance de la vulnerabilidad ya que a partir de Safari 12.1,` rel = \"noopener\" `se impone en todos los` target = \" _Blank \"` enlaces. La versi\u00f3n 1.14.1 de SmartBanner.js contiene una soluci\u00f3n para el problema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV40": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "4.0",
|
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"attackRequirements": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "PASSIVE",
|
|
"vulnConfidentialityImpact": "NONE",
|
|
"vulnIntegrityImpact": "LOW",
|
|
"vulnAvailabilityImpact": "NONE",
|
|
"subConfidentialityImpact": "LOW",
|
|
"subIntegrityImpact": "LOW",
|
|
"subAvailabilityImpact": "NONE",
|
|
"exploitMaturity": "UNREPORTED",
|
|
"confidentialityRequirement": "NOT_DEFINED",
|
|
"integrityRequirement": "NOT_DEFINED",
|
|
"availabilityRequirement": "NOT_DEFINED",
|
|
"modifiedAttackVector": "NOT_DEFINED",
|
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
|
"modifiedUserInteraction": "NOT_DEFINED",
|
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
|
"Safety": "NOT_DEFINED",
|
|
"Automatable": "NOT_DEFINED",
|
|
"Recovery": "NOT_DEFINED",
|
|
"valueDensity": "NOT_DEFINED",
|
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
|
"providerUrgency": "NOT_DEFINED"
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-601"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/ain/smartbanner.js/commit/fce8c31dfe04033d9d005a89694d3e7a60784f89",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |