CVE-2018-25058: Twitter-Post-Fetcher vulnerable to Use of Web Link to Untrusted Target with window.opener Access
(updated )
A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability.
References
- github.com/advisories/GHSA-m688-cx2p-rgq9
- github.com/jasonmayes/Twitter-Post-Fetcher/commit/7d281c6fb5acbc29a2cad295262c1f0c19ca56f3
- github.com/jasonmayes/Twitter-Post-Fetcher/pull/170
- github.com/jasonmayes/Twitter-Post-Fetcher/releases/tag/18.0.0
- nvd.nist.gov/vuln/detail/CVE-2018-25058
- vuldb.com/?ctiid.217017
- vuldb.com/?id.217017
Detect and mitigate CVE-2018-25058 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →