Loading HuntDB...

Markdown parsing issue enables insertion of malicious tags

G
Gratipay
Submitted None
Reported by ru94mb

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Markdown tags and event handlers can be used to load malicious URLs in user's profile statement. Here is the payload that when entered in user's profile statement leads to the following HTML: Payload: _www.attacker.com/malicious.exe_ Resulting HTML: "html": "<p><em><a href=\"http://www.attacker.com/malicious.exe\">www.attacker.com/malicious.exe</a></em></p>\n" See the following screenshots for more details: "Profile.jpg" "request.jpg" "response.jpg" User can be redirected to malicious URLs and malware can be hosted on gratipay.com using this vulnerability. Fix: Disable the functionality for these markdown tags.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Cross-site Scripting (XSS) - Generic