cve-2024-5739
Vulnerability from cvelistv5
Published
2024-06-12 07:00
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
The in-app browser of LINE client for iOS versions below 14.9.0 contains a Universal XSS (UXSS) vulnerability. This vulnerability allows for cross-site scripting (XSS) where arbitrary JavaScript can be executed in the top frame from an embedded iframe on any displayed web site within the in-app browser. The in-app browser is usually opened by tapping on URLs contained in chat messages, and for the attack to be successful, the victim must trigger a click event on a malicious iframe. If an iframe embedded in any website can be controlled by an attacker, this vulnerability could be exploited to capture or alter content displayed in the top frame, as well as user session information. This vulnerability affects LINE client for iOS versions below 14.9.0 and does not affect other LINE clients such as LINE client for Android. Please update LINE client for iOS to version 14.9.0 or higher.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
LINE Corporation | LINE client for iOS |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5739", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T19:19:41.096728Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T19:22:21.831Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:07.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://hackerone.com/reports/2284129" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LINE client for iOS", "vendor": "LINE Corporation", "versions": [ { "lessThan": "14.9.0", "status": "affected", "version": "14.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "The in-app browser of LINE client for iOS versions below 14.9.0 contains a Universal XSS (UXSS) vulnerability. This vulnerability allows for cross-site scripting (XSS) where arbitrary JavaScript can be executed in the top frame from an embedded iframe on any displayed web site within the in-app browser. The in-app browser is usually opened by tapping on URLs contained in chat messages, and for the attack to be successful, the victim must trigger a click event on a malicious iframe. If an iframe embedded in any website can be controlled by an attacker, this vulnerability could be exploited to capture or alter content displayed in the top frame, as well as user session information. This vulnerability affects LINE client for iOS versions below 14.9.0 and does not affect other LINE clients such as LINE client for Android. Please update LINE client for iOS to version 14.9.0 or higher." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.4, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "description": "na", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T08:24:16.591Z", "orgId": "657f3255-0560-4aed-82e4-7f579ec6acfb", "shortName": "LY-Corporation" }, "references": [ { "url": "https://hackerone.com/reports/2284129" } ] } }, "cveMetadata": { "assignerOrgId": "657f3255-0560-4aed-82e4-7f579ec6acfb", "assignerShortName": "LY-Corporation", "cveId": "CVE-2024-5739", "datePublished": "2024-06-12T07:00:35.232Z", "dateReserved": "2024-06-07T07:08:09.783Z", "dateUpdated": "2024-08-01T21:18:07.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-5739\",\"sourceIdentifier\":\"dl_cve@linecorp.com\",\"published\":\"2024-06-12T07:15:51.650\",\"lastModified\":\"2024-06-13T18:36:09.013\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The in-app browser of LINE client for iOS versions below 14.9.0 contains a Universal XSS (UXSS) vulnerability. This vulnerability allows for cross-site scripting (XSS) where arbitrary JavaScript can be executed in the top frame from an embedded iframe on any displayed web site within the in-app browser. The in-app browser is usually opened by tapping on URLs contained in chat messages, and for the attack to be successful, the victim must trigger a click event on a malicious iframe. If an iframe embedded in any website can be controlled by an attacker, this vulnerability could be exploited to capture or alter content displayed in the top frame, as well as user session information. This vulnerability affects LINE client for iOS versions below 14.9.0 and does not affect other LINE clients such as LINE client for Android. Please update LINE client for iOS to version 14.9.0 or higher.\"},{\"lang\":\"es\",\"value\":\"El navegador integrado en la aplicaci\u00f3n del cliente LINE para versiones de iOS inferiores a 14.9.0 contiene una vulnerabilidad Universal XSS (UXSS). Esta vulnerabilidad permite cross-site scripting (XSS), donde se puede ejecutar JavaScript arbitrario en el framework superior desde un iframe incrustado en cualquier sitio web mostrado dentro del navegador de la aplicaci\u00f3n. El navegador de la aplicaci\u00f3n generalmente se abre tocando las URL contenidas en los mensajes de chat y, para que el ataque tenga \u00e9xito, la v\u00edctima debe activar un evento de clic en un iframe malicioso. Si un atacante puede controlar un iframe incrustado en cualquier sitio web, esta vulnerabilidad podr\u00eda aprovecharse para capturar o alterar el contenido que se muestra en el framework superior, as\u00ed como la informaci\u00f3n de la sesi\u00f3n del usuario. Esta vulnerabilidad afecta al cliente LINE para versiones de iOS inferiores a 14.9.0 y no afecta a otros clientes LINE, como el cliente LINE para Android. Actualice el cliente LINE para iOS a la versi\u00f3n 14.9.0 o superior.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"dl_cve@linecorp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"references\":[{\"url\":\"https://hackerone.com/reports/2284129\",\"source\":\"dl_cve@linecorp.com\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.