CVE-2024-30252

Livemarks is a browser extension that provides RSS feed bookmark folders. Versions of Livemarks prior to 3.7 are vulnerable to cross-site request forgery. A malicious website may be able to coerce the extension to send an authenticated GET request to an arbitrary URL. An authenticated request is a request where the cookies of the browser are sent along with the request. The `subscribe.js` script uses the first parameter from the current URL location as the URL of the RSS feed to subscribe to and checks that the RSS feed is valid XML. `subscribe.js` is accessible by an attacker website due to its use in `subscribe.html`, an HTML page that is declared as a `web_accessible_resource` in `manifest.json`. This issue may lead to `Privilege Escalation`. A CSRF breaks the integrity of servers running on a private network. A user of the browser extension may have a private server with dangerous functionality, which is assumed to be safe due to network segmentation. Upon receiving an authenticated request instantiated from an attacker, this integrity is broken. Version 3.7 fixes this issue by removing subscribe.html from `web_accessible_resources`.
Configurations

No configuration.

History

21 Nov 2024, 09:11

Type Values Removed Values Added
Summary
  • (es) Livemarks es una extensión del navegador que proporciona carpetas de marcadores de fuentes RSS. Las versiones de Livemarks anteriores a la 3.7 son vulnerables a la cross-site-request forgery. Un sitio web malicioso puede obligar a la extensión a enviar una solicitud GET autenticada a una URL arbitraria. Una solicitud autenticada es una solicitud en la que las cookies del navegador se envían junto con la solicitud. El script `subscribe.js` utiliza el primer parámetro de la ubicación URL actual como la URL de la fuente RSS a la que suscribirse y verifica que la fuente RSS sea XML válida. `subscribe.js` es accesible para un sitio web atacante debido a su uso en `subscribe.html`, una página HTML que está declarada como `web_accessible_resource` en `manifest.json`. Este problema puede dar lugar a una "escalada de privilegios". Un CSRF rompe la integridad de los servidores que se ejecutan en una red privada. Un usuario de la extensión del navegador puede tener un servidor privado con funciones peligrosas, que se supone que es seguro debido a la segmentación de la red. Al recibir una solicitud autenticada instanciada por un atacante, esta integridad se rompe. La versión 3.7 soluciona este problema eliminando subscribe.html de `web_accessible_resources`.
References () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/manifest.json#L4 - () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/manifest.json#L4 -
References () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/pages/subscribe/subscribe.js#L52 - () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/pages/subscribe/subscribe.js#L52 -
References () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/shared/feed-parser.js#L5 - () https://github.com/nt1m/livemarks/blob/9c5233c82aa2f7c8bac348a08ff52881b00c4f95/shared/feed-parser.js#L5 -
References () https://github.com/nt1m/livemarks/commit/1bcf39f6e91f7352301013f8feac6d488719450f - () https://github.com/nt1m/livemarks/commit/1bcf39f6e91f7352301013f8feac6d488719450f -
References () https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg - () https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg -

04 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 19:15

Updated : 2025-02-27 20:15


NVD link : CVE-2024-30252

Mitre link : CVE-2024-30252

CVE.ORG link : CVE-2024-30252


JSON object : View

Products Affected

No product.

CWE
CWE-352

Cross-Site Request Forgery (CSRF)