XSS on kubernetes-csi.github.io (mdBook)
Medium
K
Kubernetes
Submitted None
Actions:
Reported by
vavkamil
Vulnerability Details
Technical details and impact analysis
Report Submission Form
## Summary:
Hi,
I have recently found XSS vulnerability in mdBook (CVE-2020-26297), fixed and disclosed on 4th January 2020.
The details were published in a security advisory here: https://blog.rust-lang.org/2021/01/04/mdbook-security-advisory.html
I did a quick recon and found a couple of vulnerable endpoints:
* https://capz.sigs.k8s.io
* https://cluster-api-aws.sigs.k8s.io
* https://cluster-api.sigs.k8s.io
* https://image-builder.sigs.k8s.io
* https://kubernetes-csi.github.io
* https://master.cluster-api.sigs.k8s.io
* https://release-0-2.cluster-api.sigs.k8s.io
* https://secrets-store-csi-driver.sigs.k8s.io
... where the **https://kubernetes-csi.github.io/docs/** is in scope. Update to the latest version and
I understand if this is not eligible for a bounty, as you didn't have enough time to fix this. On the other hand, I decided to report it anyway, in case you missed it. And because I wasn't able to find any info grading *grace period* for 0days or new CVEs in your policy.
Kind regards,
Kamil Vavra
@vavkamil
## Steps To Reproduce:
a) Payload used: `x"->xss<img/src/onerror%3Dalert(1)>`
b) PoC: `https://kubernetes-csi.github.io/docs/?search=x"->xss<img/src/onerror%3Dalert(1)>`
1. Visit [https://kubernetes-csi.github.io/docs/?search=x%22%2D%3Exss%3Cimg%2Fsrc%2Fonerror%3Dalert%281%29%3E](https://kubernetes-csi.github.io/docs/?search=x%22%2D%3Exss%3Cimg%2Fsrc%2Fonerror%3Dalert%281%29%3E)
2. You should see the XSS executed
## Mitigations:
Owners of websites built with mdBook have to upgrade to mdBook 0.4.5 or greater and rebuild their website contents with it.
## Supporting Material/References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26297
## Impact
I guess the impact here is minimal, so I submitted it with low severity.
Related CVEs
Associated Common Vulnerabilities and Exposures
CVE-2020-26297
HIGH
mdBook is a utility to create modern online books from Markdown files and is written in Rust. In mdBook before version 0.4.5, there is a vulnerability affecting the search feature of mdBook, which could allow an attacker to execute arbitrary JavaScript code on the page. The search feature of mdBook …
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected