Loading HuntDB...

[RDoc] XSS in project README files

Medium
G
GitLab
Submitted None
Reported by ysx

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hi, While experimenting with parser bypass techniques, I discovered that RDoc markup could be used to inject a stored JavaScript payload into a project `README.rdoc` file. Please note that this issue is separate to my earlier report #200565 (XSS with AsciiDoc markup), marked as duplicate. ## Steps to Reproduce 1. Create a new GitLab project 2. Initialise the project by creating a `README` file 3. Set the file title to `README.rdoc` 4. Paste the below Payload into the file 5. Commit the file to the project and click on the "XSS" link ## Proof of Concept Payload `XSS[blocked:alert(1)] <-- click to test` Thanks!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic