mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-09-17 18:45:49 +00:00
64 lines
2.8 KiB
JSON
64 lines
2.8 KiB
JSON
{
|
|
"id": "CVE-2025-24361",
|
|
"sourceIdentifier": "security-advisories@github.com",
|
|
"published": "2025-01-25T01:15:24.193",
|
|
"lastModified": "2025-01-25T01:15:24.193",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Nuxt is an open-source web development framework for Vue.js. Source code may be stolen during dev when using version 3.0.0 through 3.15.12 of the webpack builder or version 3.12.2 through 3.152 of the rspack builder and a victim opens a malicious web site. Because the request for classic script by a script tag is not subject to same origin policy, an attacker can inject a malicious script in their site and run the script. By using `Function::toString` against the values in `window.webpackChunknuxt_app`, the attacker can get the source code. Version 3.15.13 of Nuxt patches this issue."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Nuxt es un desarrollo web de c\u00f3digo abierto framework para Vue.js. El c\u00f3digo fuente puede ser robado durante el desarrollo cuando se usa la versi\u00f3n 3.0.0 a la 3.15.12 del generador webpack o la versi\u00f3n 3.12.2 a la 3.152 del generador rspack y una v\u00edctima abre un sitio web malicioso. Debido a que la solicitud de la etiqueta script bscriptript cl\u00e1sica no est\u00e1 sujeta a la pol\u00edtica del mismo origen, un atacante puede inyectar un script de scripts** en su sitio scriptn el script. Al usar `Function::toString` contra los valores en `window.webpackChunknuxt_app`, el atacante puede obtener el c\u00f3digo fuente. La versi\u00f3n 3.15.13 de Nuxt corrige este problema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 3.6
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "security-advisories@github.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-749"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://github.com/nuxt/nuxt/commit/7eeb910bf4accb1e0193b9178c746f06ad3dd88f",
|
|
"source": "security-advisories@github.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-4gf7-ff8x-hq99",
|
|
"source": "security-advisories@github.com"
|
|
}
|
|
]
|
|
} |