CVE-2024-35222: iFrames Bypass Origin Checks for Tauri API Access Control
Remote origin iFrames in Tauri applications can access the Tauri IPC endpoints without being explicitly allowed in the dangerousRemoteDomainIpcAccess
in v1 and in the capabilities
in v2.
This bypasses the origin check and allows iFrames to access the IPC endpoints exposed to the parent window.
For this to be exploitable, an attacker must have script execution (e.g. XSS) in a script-enabled iFrame of a Tauri application.
References
- github.com/advisories/GHSA-57fm-592m-34r7
- github.com/tauri-apps/tauri
- github.com/tauri-apps/tauri/commit/d950ac1239817d17324c035e5c4769ee71fc197d
- github.com/tauri-apps/tauri/commit/f6d81dfe0871e0ccd012e5190d41e3767e733608
- github.com/tauri-apps/tauri/issues/8316
- github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7
- nvd.nist.gov/vuln/detail/CVE-2024-35222
Detect and mitigate CVE-2024-35222 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →