A user could create and share a resource with a malicious URI. When the victim opens with menu “Open URI in a new tab” function, the malicious page has access to the window.opener object.
The newly opened malicious page can for example change the window.opener.location to redirect the user to a phishing page, or call a JavaScript function served by the AppJS on the user behalf for example to try to affect the integrity of the data.
The code that opens a new window via window.open(); now open the tab with the noopener attribute.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-657" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-05-20T17:09:57Z" }