Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2018-11101 | First vendor Publication | 2018-05-17 |
Vendor | Cve | Last vendor Modification | 2018-06-19 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | |||
---|---|---|---|
Overall CVSS Score | 6.1 | ||
Base Score | 6.1 | Environmental Score | 6.1 |
impact SubScore | 2.7 | Temporal Score | 6.1 |
Exploitabality Sub Score | 2.8 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | Required |
Scope | Changed | Confidentiality Impact | Low |
Integrity Impact | Low | Availability Impact | None |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Open Whisper Signal (aka Signal-Desktop) through 1.10.1 allows XSS via a resource location specified in an attribute of a SCRIPT, IFRAME, or IMG element, leading to JavaScript execution after a reply, a different vulnerability than CVE-2018-10994. The attacker needs to send HTML code directly as a message, and then reply to that message to trigger this vulnerability. The Signal-Desktop software fails to sanitize specific HTML elements that can be used to inject HTML code into remote chat windows when replying to an HTML message. Specifically the IMG and IFRAME elements can be used to include remote or local resources. For example, the use of an IFRAME element enables full code execution, allowing an attacker to download/upload files, information, etc. The SCRIPT element was also found to be injectable. On the Windows operating system, the CSP fails to prevent remote inclusion of resources via the SMB protocol. In this case, remote execution of JavaScript can be achieved by referencing the script on an SMB share within an IFRAME element, for example: |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11101 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Sources (Detail)
Source | Url |
---|---|
FULLDISC | http://seclists.org/fulldisclosure/2018/May/46 |
Alert History
Date | Informations |
---|---|
2021-05-04 13:07:06 |
|
2021-04-22 02:20:49 |
|
2020-05-23 02:10:23 |
|
2020-05-23 01:06:11 |
|
2019-06-21 12:09:31 |
|
2018-07-04 12:02:53 |
|
2018-06-20 00:19:30 |
|
2018-05-19 09:19:09 |
|
2018-05-18 00:19:18 |
|