GHSA-62R2-GCXR-426X
Vulnerability from github – Published: 2024-09-30 17:48 – Updated: 2024-09-30 20:11
VLAI?
Summary
starcitizentools/citizen-skin vulnerable to stored, self-XSS in the "real name" field
Details
Summary
A user with the editmyprivateinfo right or who can otherwise change their name can XSS themselves by setting their "real name" to an XSS payload.
Details
Here's the offending line: https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137
This was introduced in 717d16af35b10dab04d434aefddbf991fc8c168c
PoC
- Login
- Go to Special:Preferences
- Set the real name field to a string like
<script>alert("Admin with a propensity for self-XSSes")</script> - Save your settings and use Citizen if it's not being used already
Impact
Any user who can change their name (whether it's through the editmyprivateinfo right or through other means) can add XSS payloads that trigger for themselves only.
Severity ?
4.6 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "starcitizentools/citizen-skin"
},
"ranges": [
{
"events": [
{
"introduced": "2.6.3"
},
{
"fixed": "2.31.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-47536"
],
"database_specific": {
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"github_reviewed": true,
"github_reviewed_at": "2024-09-30T17:48:33Z",
"nvd_published_at": "2024-09-30T17:15:04Z",
"severity": "MODERATE"
},
"details": "### Summary\nA user with the `editmyprivateinfo` right or who can otherwise change their name can XSS themselves by setting their \"real name\" to an XSS payload.\n\n### Details\nHere\u0027s the offending line:\nhttps://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137\n\nThis was introduced in 717d16af35b10dab04d434aefddbf991fc8c168c\n\n### PoC\n1. Login\n2. Go to Special:Preferences\n3. Set the real name field to a string like `\u003cscript\u003ealert(\"Admin with a propensity for self-XSSes\")\u003c/script\u003e`\n4. Save your settings and use Citizen if it\u0027s not being used already\n\n\n\n### Impact\nAny user who can change their name (whether it\u0027s through the editmyprivateinfo right or through other means) can add XSS payloads that trigger for themselves only. ",
"id": "GHSA-62r2-gcxr-426x",
"modified": "2024-09-30T20:11:49Z",
"published": "2024-09-30T17:48:33Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/security/advisories/GHSA-62r2-gcxr-426x"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47536"
},
{
"type": "WEB",
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/717d16af35b10dab04d434aefddbf991fc8c168c"
},
{
"type": "WEB",
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/commit/86da3e07718c8d8da6f4310386fef85599606f9b"
},
{
"type": "PACKAGE",
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen"
},
{
"type": "WEB",
"url": "https://github.com/StarCitizenTools/mediawiki-skins-Citizen/blob/d45c3d69f30863f622f16eb40dd41d3ca943454a/includes/Components/CitizenComponentUserInfo.php#L137"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": " starcitizentools/citizen-skin vulnerable to stored, self-XSS in the \"real name\" field"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…