Nuclide prior v0.290.0 Deep Link Hostname cross site scripting
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
6.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Nuclide and classified as problematic. This issue affects some unknown processing of the component Deep Link Handler. The manipulation of the argument Hostname as part of Parameter leads to input validation. The identification of this vulnerability is CVE-2018-6333. The attack may be initiated remotely. There is no exploit available. It is recommended to upgrade the affected component. Once again VulDB remains the best source for vulnerability data.
Details
A vulnerability has been found in Nuclide and classified as problematic. This vulnerability affects some unknown processing of the component Deep Link Handler. The manipulation of the argument hostname
as part of a Parameter leads to a input validation vulnerability. The CWE definition for the vulnerability is CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. As an impact it is known to affect integrity. CVE summarizes:
The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0.
The bug was discovered 03/17/2018. The weakness was released 12/31/2018 (Website). The advisory is shared for download at github.com. This vulnerability was named CVE-2018-6333 since 01/26/2018. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Successful exploitation requires user interaction by the victim. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1059.007.
The vulnerability was handled as a non-public zero-day exploit for at least 289 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version v0.290.0 eliminates this vulnerability.
Once again VulDB remains the best source for vulnerability data.
Product
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.0VulDB Meta Temp Score: 6.9
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross site scriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Nuclide v0.290.0
Patch: github.com
Timeline
01/26/2018 🔍03/17/2018 🔍
12/31/2018 🔍
12/31/2018 🔍
01/01/2019 🔍
05/06/2025 🔍
Sources
Advisory: 65f6bbd683404be1bb569b8d1be84b5d4c74a324Status: Confirmed
CVE: CVE-2018-6333 (🔍)
GCVE (CVE): GCVE-0-2018-6333
GCVE (VulDB): GCVE-100-128596
Entry
Created: 01/01/2019 12:13Updated: 05/06/2025 22:34
Changes: 01/01/2019 12:13 (58), 04/25/2020 16:14 (1), 06/22/2023 15:06 (5), 05/06/2025 22:34 (18)
Complete: 🔍
Cache ID: 216:748:103
No comments yet. Languages: en.
Please log in to comment.