CVE-2023-22475

Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-based Canarytoken (a URL) can use this to execute Javascript in the Canarytoken's trigger history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. This vulnerability is similar to CVE-2022-31113, but affected parameters reported differently from the Canarytoken trigger request. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. Canarytokens Docker images sha-fb61290 and later contain a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*

History

07 Nov 2023, 04:06

Type Values Removed Values Added
Summary Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-based Canarytoken (a URL) can use this to execute Javascript in the Canarytoken's trigger history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. This vulnerability is similar to CVE-2022-31113, but affected parameters reported differently from the Canarytoken trigger request. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. Canarytokens Docker images sha-fb61290 and later contain a patch for this issue. Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens prior to sha-fb61290. An attacker who discovers an HTTP-based Canarytoken (a URL) can use this to execute Javascript in the Canarytoken's trigger history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. This vulnerability is similar to CVE-2022-31113, but affected parameters reported differently from the Canarytoken trigger request. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. Canarytokens Docker images sha-fb61290 and later contain a patch for this issue.

12 Jan 2023, 15:32

Type Values Removed Values Added
CPE cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Thinkst canarytokens
Thinkst
References (MISC) https://github.com/thinkst/canarytokens/security/advisories/GHSA-3h2c-3fgr-74vh - (MISC) https://github.com/thinkst/canarytokens/security/advisories/GHSA-3h2c-3fgr-74vh - Patch, Third Party Advisory
References (MISC) https://github.com/thinkst/canarytokens/commit/fb612906f2217bbb8863199694891d16e20bad3e - (MISC) https://github.com/thinkst/canarytokens/commit/fb612906f2217bbb8863199694891d16e20bad3e - Patch, Third Party Advisory
References (MISC) https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr - (MISC) https://github.com/thinkst/canarytokens/security/advisories/GHSA-5675-3424-hpqr - Third Party Advisory

06 Jan 2023, 17:26

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-06 15:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-22475

Mitre link : CVE-2023-22475

CVE.ORG link : CVE-2023-22475


JSON object : View

Products Affected

thinkst

  • canarytokens
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')