Lucene search

K
githubGitHub Advisory DatabaseGHSA-C33W-PM52-MQVF
HistoryOct 25, 2022 - 8:22 p.m.

@dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details

2022-10-2520:22:01
CWE-79
GitHub Advisory Database
github.com
14

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

31.0%

Description

Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library Showdown. Showdown does not have any XSS countermeasures built in, and versions before 4.6.1 of the Dependency-Track frontend did not encode or sanitize Showdown’s output. This made it possible for arbitrary JavaScript included in vulnerability details via HTML attributes to be executed in context of the frontend.

Impact

Actors with the VULNERABILITY_MANAGEMENT permission can exploit this weakness by creating or editing a custom vulnerability and providing XSS payloads in any of the following fields:

  • Description
  • Details
  • Recommendation
  • References

The payload will be executed for users with the VIEW_PORTFOLIO permission when browsing to the modified vulnerability’s page, for example:

https://dtrack.example.com/vulnerabilities/INTERNAL/INT-jd8u-e8tl-8lwu

Alternatively, malicious JavaScript could be introduced via any of the vulnerability databases mirrored by Dependency-Track (NVD, GitHub Advisories, OSV, OSS Index, VulnDB). However, this attack vector is highly unlikely, and the team is not aware of any occurrence of this happening.

> Note> The Vulnerability Details element of the Audit Vulnerabilities tab in the project view isnot affected.

Patches

The issue has been fixed in frontend version 4.6.1.

Credit

Thanks to GitHub user Waterstraal for finding and responsibly disclosing the issue.

CPENameOperatorVersion
@dependencytrack/frontendlt4.6.1

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

31.0%

Related for GHSA-C33W-PM52-MQVF