2025-03-02 03:03:52 +00:00

94 lines
5.2 KiB
JSON

{
"id": "CVE-2025-25300",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-18T18:15:35.330",
"lastModified": "2025-02-18T19:15:28.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel=\"noopener\"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel=\"noopener\"` is imposed on all `target=\"_blank\"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue."
},
{
"lang": "es",
"value": "SmartBanner.js es un banner de aplicaciones inteligente personalizable para iOS y Android. Antes de la versi\u00f3n 1.14.1, haga clic en el enlace SmartBanner `View` y navegando a la p\u00e1gina de terceros de las hojas de` Window.opener` expuestas. Puede permitir que terceros hostiles abusen de `window.opener`, por ejemplo, mediante redirecci\u00f3n o inyecci\u00f3n en la p\u00e1gina original con SmartBanner. `rel =\" noopener \"` se pobla autom\u00e1ticamente en enlaces a partir de `v1.14.1`, que es una actualizaci\u00f3n recomendada para resolver la vulnerabilidad. Algunos workarounds est\u00e1n disponibles para aquellos que no pueden actualizar. Aseg\u00farese de que el enlace 'Ver' solo est\u00e9 llevando a los usuarios a App Store o Google Play Store, donde la seguridad est\u00e1 protegida por los respectivos equipos de seguridad de la tienda de aplicaciones. Si el enlace `View` va a una p\u00e1gina de terceros, limite SmartBanner.js para usarse en iOS que disminuye el alcance de la vulnerabilidad ya que a partir de Safari 12.1,` rel = \"noopener\" `se impone en todos los` target = \" _Blank \"` enlaces. La versi\u00f3n 1.14.1 de SmartBanner.js contiene una soluci\u00f3n para el problema."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "UNREPORTED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/ain/smartbanner.js/commit/fce8c31dfe04033d9d005a89694d3e7a60784f89",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2",
"source": "security-advisories@github.com"
}
]
}