
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-24762 affects sysend.js, a library that enables message sending between browser tabs. The vulnerability was discovered and disclosed in March 2022, affecting versions prior to 1.10.0. The issue allows attackers to intercept cross-origin communications between pages open in the same browser (GitHub Advisory, NVD).
The vulnerability stems from an origin validation error (CWE-346) and exposure of sensitive information to unauthorized actors (CWE-200). It has a CVSS v3.1 base score of 6.5 (Medium), with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. The issue specifically affects the cross-origin communication feature, where attackers could create an iframe and listen to any messages sent from the application, as well as send messages to the app (GitHub Issue).
The vulnerability's impact is limited to communications occurring within the same browser. Attackers can potentially intercept sensitive information sent through sysend messages when cross-origin communication is used. However, the scope is constrained as it only affects users using the same browser instance (GitHub Advisory).
The vulnerability has been patched in sysend.js version 1.10.0. The fix includes implementation of origin validation for cross-domain communication. For users unable to update immediately, the recommended workaround is to avoid sending sensitive information through sysend messages (GitHub Release, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."