製品・ソフトウェアに関する情報
Open Whisper Signal におけるクロスサイトスクリプティングの脆弱性
Title Open Whisper Signal におけるクロスサイトスクリプティングの脆弱性
Summary

Open Whisper Signal (別名 Signal-Desktop) には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date May 16, 2018, midnight
Registration Date July 6, 2018, 4:52 p.m.
Last Update July 6, 2018, 4:52 p.m.
CVSS3.0 : 警告
Score 6.1
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS2.0 : 警告
Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Affected System
Open Whisper Systems
Signal 1.10.1 まで
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年07月06日]
  掲載
July 6, 2018, 4:52 p.m.

NVD Vulnerability Information
CVE-2018-11101
Summary

Open Whisper Signal (aka Signal-Desktop) through 1.10.1 allows XSS via a resource location specified in an attribute of a SCRIPT, IFRAME, or IMG element, leading to JavaScript execution after a reply, a different vulnerability than CVE-2018-10994. The attacker needs to send HTML code directly as a message, and then reply to that message to trigger this vulnerability. The Signal-Desktop software fails to sanitize specific HTML elements that can be used to inject HTML code into remote chat windows when replying to an HTML message. Specifically the IMG and IFRAME elements can be used to include remote or local resources. For example, the use of an IFRAME element enables full code execution, allowing an attacker to download/upload files, information, etc. The SCRIPT element was also found to be injectable. On the Windows operating system, the CSP fails to prevent remote inclusion of resources via the SMB protocol. In this case, remote execution of JavaScript can be achieved by referencing the script on an SMB share within an IFRAME element, for example: <IFRAME src=\\DESKTOP-XXXXX\Temp\test.html> and then replying to it. The included JavaScript code is then executed automatically, without any interaction needed from the user. The vulnerability can be triggered in the Signal-Desktop client by sending a specially crafted message and then replying to it with any text or content in the reply (it doesn't matter).

Publication Date May 18, 2018, 4:29 a.m.
Registration Date March 1, 2021, 6:44 p.m.
Last Update Nov. 21, 2024, 12:42 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:* 1.10.1
Related information, measures and tools
Common Vulnerabilities List