Loading HuntDB...

[Textile] XSS in project README files

Medium
G
GitLab
Submitted None
Reported by ysx

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Generic
Hi, Another parser bypass here – I discovered that Textile markup can be used to inject a stored JavaScript payload into a project `README.textile` file :) ## Steps to Reproduce 1. Create a new GitLab project 2. Initialise the project by creating a `README` file 3. Set the file title to `README.textile` 4. Paste the below Payload into the file 5. Commit the file to the project and click on the link ## Proof of Concept Payload ``` "Security test link":blocked:alert(document.domain) ``` Thanks!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Generic