Markdown parsing issue enables insertion of malicious tags
G
Gratipay
Submitted None
Actions:
Reported by
ru94mb
Vulnerability Details
Technical details and impact analysis
Markdown tags and event handlers can be used to load malicious URLs in user's profile statement.
Here is the payload that when entered in user's profile statement leads to the following HTML:
Payload: _www.attacker.com/malicious.exe_
Resulting HTML: "html": "<p><em><a href=\"http://www.attacker.com/malicious.exe\">www.attacker.com/malicious.exe</a></em></p>\n"
See the following screenshots for more details:
"Profile.jpg"
"request.jpg"
"response.jpg"
User can be redirected to malicious URLs and malware can be hosted on gratipay.com using this vulnerability.
Fix:
Disable the functionality for these markdown tags.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Cross-site Scripting (XSS) - Generic