Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-34714
HistoryMay 14, 2024 - 2:48 p.m.

CVE-2024-34714 Hoppscotch Extension responds to calls made by origins not in the domain list

2024-05-1414:48:36
CWE-354
GitHub_M
github.com
hoppscotch
extension
vulnerability
patch
version
browser
security
cors
restriction
chrome
firefox

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

The Hoppscotch Browser Extension is a browser extension for Hoppscotch, a community-driven end-to-end open-source API development ecosystem. Due to an oversight during a change made to the extension in the commit d4e8e4830326f46ba17acd1307977ecd32a85b58, a critical check for the origin list was missed and allowed for messages to be sent to the extension which the extension gladly processed and responded back with the results of, while this wasn’t supposed to happen and be blocked by the origin not being present in the origin list.

This vulnerability exposes Hoppscotch Extension users to sites which call into Hoppscotch Extension APIs internally. This fundamentally allows any site running on the browser with the extension installed to bypass CORS restrictions if the user is running extensions with the given version. This security hole was patched in the commit 7e364b928ab722dc682d0fcad713a96cc38477d6 which was released along with the extension version 0.35. As a workaround, Chrome users can use the Extensions Settings to disable the extension access to only the origins that you want. Firefox doesn’t have an alternative to upgrading to a fixed version.

CNA Affected

[
  {
    "vendor": "hoppscotch",
    "product": "hoppscotch-extension",
    "versions": [
      {
        "version": ">= 0.28, < 0.35",
        "status": "affected"
      }
    ]
  }
]

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.8%

Related for VULNRICHMENT:CVE-2024-34714