Vulnerability Details : CVE-2023-22475
Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-based Canarytoken (a URL) can use this to execute Javascript in the Canarytoken's trigger history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. This vulnerability is similar to CVE-2022-31113, but affected parameters reported differently from the Canarytoken trigger request. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. Canarytokens Docker images sha-fb61290 and later contain a patch for this issue.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2023-22475
- cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-22475
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-22475
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
GitHub, Inc. |
CWE ids for CVE-2023-22475
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-22475
-
https://github.com/thinkst/canarytokens/security/advisories/GHSA-3h2c-3fgr-74vh
Cross-Site Scripting in Canarytoken history · Advisory · thinkst/canarytokens · GitHubPatch;Third Party Advisory
-
https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr
Cross-Site Scripting in Canarytoken history · Advisory · thinkst/canarytokens · GitHubThird Party Advisory
-
https://github.com/thinkst/canarytokens/commit/fb612906f2217bbb8863199694891d16e20bad3e
Use an autoescaped env for history page (#170) · thinkst/canarytokens@fb61290 · GitHubPatch;Third Party Advisory
Jump to