CVE-2024-34714

7.6 HIGH

📋 TL;DR

The Hoppscotch Browser Extension vulnerability allows any website to send messages to the extension and receive responses, bypassing CORS restrictions. This affects all users running vulnerable versions of the extension, enabling malicious sites to interact with the extension's APIs without proper origin validation.

💻 Affected Systems

Products:
  • Hoppscotch Browser Extension
Versions: Versions before 0.35
Operating Systems: All operating systems with supported browsers
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Chrome and Firefox browsers with the vulnerable extension installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious websites could use the extension to make unauthorized API requests, potentially accessing internal systems, exfiltrating data, or performing actions on behalf of the user.

🟠

Likely Case

Attackers could use the extension to bypass CORS policies and make cross-origin requests to internal APIs or services that would normally be blocked.

🟢

If Mitigated

With proper controls, the extension would only respond to messages from approved origins, preventing unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available at provided URL. Exploitation requires user to visit a malicious website with the vulnerable extension installed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.35

Vendor Advisory: https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v

Restart Required: No

Instructions:

1. Open your browser's extension management page. 2. Find Hoppscotch Extension. 3. Check for updates or manually update to version 0.35 or later. 4. The extension will automatically update if updates are enabled.

🔧 Temporary Workarounds

Chrome Extension Site Access Restriction

all

Limit extension access to specific sites only in Chrome

🧯 If You Can't Patch

  • Disable the Hoppscotch Extension completely until patched
  • Use browser settings to restrict extension permissions to trusted sites only

🔍 How to Verify

Check if Vulnerable:

Check extension version in browser extensions page. If version is below 0.35, you are vulnerable.

Check Version:

Browser-specific: Chrome: chrome://extensions/, Firefox: about:addons

Verify Fix Applied:

Confirm extension version is 0.35 or higher in browser extensions settings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual extension activity logs
  • Unexpected cross-origin requests from browser

Network Indicators:

  • Unexpected API calls originating from browser extension context
  • CORS policy violations that shouldn't be possible

SIEM Query:

Search for browser extension process making network requests to unexpected domains or internal APIs

🔗 References

📤 Share & Export