ghsa-62r2-gcxr-426x
Vulnerability from github
Published
2024-09-30 17:48
Modified
2024-09-30 20:11
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
4.8 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
4.8 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
VLAI Severity ?
Summary
starcitizentools/citizen-skin vulnerable to stored, self-XSS in the "real name" field
Details
Summary
A user with the editmyprivateinfo
right or who can otherwise change their name can XSS themselves by setting their "real name" to an XSS payload.
Details
Here's the offending line: https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137
This was introduced in 717d16af35b10dab04d434aefddbf991fc8c168c
PoC
- Login
- Go to Special:Preferences
- Set the real name field to a string like
<script>alert("Admin with a propensity for self-XSSes")</script>
- Save your settings and use Citizen if it's not being used already
Impact
Any user who can change their name (whether it's through the editmyprivateinfo right or through other means) can add XSS payloads that trigger for themselves only.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "starcitizentools/citizen-skin" }, "ranges": [ { "events": [ { "introduced": "2.6.3" }, { "fixed": "2.31.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-47536" ], "database_specific": { "cwe_ids": [ "CWE-79", "CWE-80" ], "github_reviewed": true, "github_reviewed_at": "2024-09-30T17:48:33Z", "nvd_published_at": "2024-09-30T17:15:04Z", "severity": "MODERATE" }, "details": "### Summary\nA user with the `editmyprivateinfo` right or who can otherwise change their name can XSS themselves by setting their \"real name\" to an XSS payload.\n\n### Details\nHere\u0027s the offending line:\nhttps://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137\n\nThis was introduced in 717d16af35b10dab04d434aefddbf991fc8c168c\n\n### PoC\n1. Login\n2. Go to Special:Preferences\n3. Set the real name field to a string like `\u003cscript\u003ealert(\"Admin with a propensity for self-XSSes\")\u003c/script\u003e`\n4. Save your settings and use Citizen if it\u0027s not being used already\n\n\n\n### Impact\nAny user who can change their name (whether it\u0027s through the editmyprivateinfo right or through other means) can add XSS payloads that trigger for themselves only. ", "id": "GHSA-62r2-gcxr-426x", "modified": "2024-09-30T20:11:49Z", "published": "2024-09-30T17:48:33Z", "references": [ { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-62r2-gcxr-426x" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47536" }, { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/717d16af35b10dab04d434aefddbf991fc8c168c" }, { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/86da3e07718c8d8da6f4310386fef85599606f9b" }, { "type": "PACKAGE", "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen" }, { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", "type": "CVSS_V4" } ], "summary": " starcitizentools/citizen-skin vulnerable to stored, self-XSS in the \"real name\" field" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…