A user could create and share a resource with a malicious URI. When the victim opens with menu “Open URI in a new tab” function, the malicious page has access to the window.opener object.
The newly opened malicious page can for example change the window.opener.location to redirect the user to a phishing page, or call a JavaScript function served by the AppJS on the user behalf for example to try to affect the integrity of the data.
The code that opens a new window via window.open(); now open the tab with the noopener attribute.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-657"
],
"nvd_published_at": null,
"github_reviewed_at": "2024-05-20T17:09:57Z",
"severity": "MODERATE"
}