CVE-2024-34714

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-34714
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-34714.json
Aliases
  • GHSA-jjh5-pvqx-gg5v
Published
2024-05-14T16:17:27Z
Modified
2024-05-19T02:24:48.987682Z
Summary
[none]
Details

The Hoppscotch Browser Extension is a browser extension for Hoppscotch, a community-driven end-to-end open-source API development ecosystem. Due to an oversight during a change made to the extension in the commit d4e8e4830326f46ba17acd1307977ecd32a85b58, a critical check for the origin list was missed and allowed for messages to be sent to the extension which the extension gladly processed and responded back with the results of, while this wasn't supposed to happen and be blocked by the origin not being present in the origin list.

This vulnerability exposes Hoppscotch Extension users to sites which call into Hoppscotch Extension APIs internally. This fundamentally allows any site running on the browser with the extension installed to bypass CORS restrictions if the user is running extensions with the given version. This security hole was patched in the commit 7e364b928ab722dc682d0fcad713a96cc38477d6 which was released along with the extension version 0.35. As a workaround, Chrome users can use the Extensions Settings to disable the extension access to only the origins that you want. Firefox doesn't have an alternative to upgrading to a fixed version.

References

Affected packages

Git / github.com/hoppscotch/hoppscotch-extension

Affected ranges

Type
GIT
Repo
https://github.com/hoppscotch/hoppscotch-extension
Events
Introduced
0The exact introduced commit is unknown
Fixed
Fixed