// For flags

CVE-2024-50346

WebFeed HTML injection vulnerabilities

Severity Score

5.1
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

WebFeed is a lightweight web feed reader extension for Firefox/Chrome. Multiple HTML injection vulnerabilities in WebFeed can lead to CSRF and UI spoofing attacks. A remote attacker can provide malicious RSS feeds and attract the victim user to visit it using WebFeed. The attacker can then inject malicious HTML into the extension page and fool the victim into sending out HTTP requests to arbitrary sites with the victim's credentials. Users are vulnerable to CSRF attacks when visiting malicious RSS feeds via WebFeed. Unwanted actions could be executed on the user's behalf on arbitrary websites. This issue has been addressed in release version 0.9.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.

WebFeed es una extensión ligera de lectura de feeds web para Firefox/Chrome. Varias vulnerabilidades de inyección de HTML en WebFeed pueden provocar ataques de suplantación de interfaz de usuario y CSRF. Un atacante remoto puede proporcionar feeds RSS maliciosos y atraer al usuario víctima para que los visite mediante WebFeed. El atacante puede entonces inyectar HTML malicioso en la página de la extensión y engañar a la víctima para que envíe solicitudes HTTP a sitios arbitrarios con las credenciales de la víctima. Los usuarios son vulnerables a ataques CSRF cuando visitan feeds RSS maliciosos a través de WebFeed. Se podrían ejecutar acciones no deseadas en nombre del usuario en sitios web arbitrarios. Este problema se ha solucionado en la versión de lanzamiento 0.9.2. Se recomienda a todos los usuarios que actualicen. No existen soluciones alternativas conocidas para esta vulnerabilidad.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
Active
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
Low
Low
Availability
None
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-10-22 CVE Reserved
  • 2024-11-04 CVE Published
  • 2024-11-05 CVE Updated
  • 2024-11-05 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Taoso
Search vendor "Taoso"
Webfeed
Search vendor "Taoso" for product "Webfeed"
< 0.9.2
Search vendor "Taoso" for product "Webfeed" and version " < 0.9.2"
en
Affected