CVE-2024-50346

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50346
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-50346.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-50346
Aliases
  • GHSA-mrc7-2q3w-48j8
Published
2024-11-05T00:15:04Z
Modified
2024-11-05T17:49:43.185584Z
Summary
[none]
Details

WebFeed is a lightweight web feed reader extension for Firefox/Chrome. Multiple HTML injection vulnerabilities in WebFeed can lead to CSRF and UI spoofing attacks. A remote attacker can provide malicious RSS feeds and attract the victim user to visit it using WebFeed. The attacker can then inject malicious HTML into the extension page and fool the victim into sending out HTTP requests to arbitrary sites with the victim's credentials. Users are vulnerable to CSRF attacks when visiting malicious RSS feeds via WebFeed. Unwanted actions could be executed on the user's behalf on arbitrary websites. This issue has been addressed in release version 0.9.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/taoso/webfeed

Affected ranges

Type
GIT
Repo
https://github.com/taoso/webfeed
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1
v0.2
v0.3
v0.4
v0.5
v0.6
v0.7