2024-07-14 02:06:08 +00:00

117 lines
5.7 KiB
JSON

{
"id": "CVE-2023-22475",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-06T15:15:09.903",
"lastModified": "2023-11-07T04:06:58.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-based Canarytoken (a URL) can use this to execute Javascript in the Canarytoken's trigger history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator.\n\nThis vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location.\n\nThis vulnerability is similar to CVE-2022-31113, but affected parameters reported differently from the Canarytoken trigger request. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. Canarytokens Docker images sha-fb61290 and later contain a patch for this issue."
},
{
"lang": "es",
"value": "Canarytokens es una herramienta de c\u00f3digo abierto que ayuda a rastrear la actividad y las acciones en su red. Se identific\u00f3 una vulnerabilidad de cross site scripting en la p\u00e1gina del historial de Canarytokens activados antes de sha-fb61290. Un atacante que descubre un Canarytoken basado en HTTP (una URL) puede usarlo para ejecutar Javascript en la p\u00e1gina del historial de activaci\u00f3n del Canarytoken (dominio: canarytokens.org) cuando el creador del Canarytoken visite posteriormente la p\u00e1gina del historial. Esta vulnerabilidad podr\u00eda usarse para deshabilitar o eliminar el Canarytoken afectado, o ver su historial de activaci\u00f3n. Tambi\u00e9n podr\u00eda usarse como un trampol\u00edn para revelar m\u00e1s informaci\u00f3n sobre el creador del Canarytoken al atacante. Por ejemplo, un atacante podr\u00eda recuperar la direcci\u00f3n de correo electr\u00f3nico vinculada al Canarytoken o colocar Javascript en la p\u00e1gina del historial que redirige al creador hacia un Canarytoken controlado por el atacante para mostrar la ubicaci\u00f3n de red del creador. Esta vulnerabilidad es similar a CVE-2022-31113, pero los par\u00e1metros afectados se informaron de manera diferente a la solicitud de activaci\u00f3n de Canarytoken. Un atacante s\u00f3lo podr\u00eda actuar sobre el Canarytoken descubierto. Este problema no expuso a otros Canarytokens ni a otros creadores de Canarytoken. Las im\u00e1genes de Canarytokens Docker sha-fb61290 y posteriores contienen un parche para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-01-06",
"matchCriteriaId": "81509DD9-44EC-440D-A0EC-9CE8563D0A72"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/thinkst/canarytokens/commit/fb612906f2217bbb8863199694891d16e20bad3e",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-3h2c-3fgr-74vh",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}