CVE-2020-36624

A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520.
Configurations

Configuration 1 (hide)

cpe:2.3:a:texthelpers_project:texthelpers:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:28

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en ahorner text-helpers hasta 1.0.x. Ha sido declarada crítica. Esta vulnerabilidad afecta a un código desconocido del archivo lib/text_helpers/translation.rb. La manipulación del argumento link conduce al uso de un enlace web a un objetivo que no es de confianza con acceso a window.opener. El ataque se puede iniciar de forma remota. La actualización a la versión 1.1.0 puede solucionar este problema. El nombre del parche es 184b60ded0e43c985788582aca2d1e746f9405a3. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216520.

29 Dec 2022, 16:06

Type Values Removed Values Added
References (MISC) https://github.com/ahorner/text-helpers/pull/19 - (MISC) https://github.com/ahorner/text-helpers/pull/19 - Patch, Third Party Advisory
References (MISC) https://github.com/ahorner/text-helpers/releases/tag/v1.1.0 - (MISC) https://github.com/ahorner/text-helpers/releases/tag/v1.1.0 - Release Notes, Third Party Advisory
References (MISC) https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3 - (MISC) https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3 - Patch, Third Party Advisory
References (MISC) https://vuldb.com/?id.216520 - (MISC) https://vuldb.com/?id.216520 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Texthelpers Project texthelpers
Texthelpers Project
CPE cpe:2.3:a:texthelpers_project:texthelpers:*:*:*:*:*:*:*:*

24 Dec 2022, 22:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/ahorner/text-helpers/releases/tag/v1.2.0', 'name': 'https://github.com/ahorner/text-helpers/releases/tag/v1.2.0', 'tags': [], 'refsource': 'MISC'}
  • (MISC) https://github.com/ahorner/text-helpers/releases/tag/v1.1.0 -
Summary A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520. A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520.
CWE CWE-266

22 Dec 2022, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-22 10:15

Updated : 2024-05-17 01:48


NVD link : CVE-2020-36624

Mitre link : CVE-2020-36624

CVE.ORG link : CVE-2020-36624


JSON object : View

Products Affected

texthelpers_project

  • texthelpers
CWE
CWE-1022

Use of Web Link to Untrusted Target with window.opener Access