Lucene search

K
hackeroneSudiH1:2246576
HistoryNov 09, 2023 - 4:47 p.m.

GitHub: Self XSS in Tag name pattern field /<username>/<reponame>/settings/tag_protection/new

2023-11-0916:47:30
sudi
hackerone.com
2
github
xss
tag protection
csrf
html injection
csp bypass

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Cross-site Scripting in the tag name pattern field in the tag protections UI in GitHub Enterprise Server allows a malicious website that requires user interaction and social engineering to make changes to a user account via CSP bypass with created CSRF tokens. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in all versions of 3.11.5, 3.10.7, 3.9.10, and 3.8.15.
CVE-2024-1084
@ros876 found an HTML injection vulnerability in GitHub’s tag protection settings page. The vulnerability occurred when an error response from the check_pattern endpoint got injected directly into the DOM via innerHTML without proper sanitization. Exploitation required the victim to “drag-and-drop” a payload into a textbox, @sudi helped set up the POC for this. The CSP on github.com prevented any script execution from the injected HTML, but @joaxcar proved that an attacker could still perform sensitive actions using a combination of “on-site” script gadgets

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.5%

Related for H1:2246576