CVE-2024-45793: Prevent XSS from Confidant API call
What kind of vulnerability is it? Who is impacted? Potential XSS from API calls below: GET /v1/credentials GET /v1/credentials/ GET /v1/archive/credentials/ GET /v1/archive/credentials POST /v1/credentials PUT /v1/credentials/ PUT /v1/credentials//<to_revision>
GET /v1/services GET /v1/services/ GET /v1/archive/services/ GET /v1/archive/services PUT /v1/services/ PUT /v1/services//<to_revision>
Stored XSS that can only be used as a stored HTML injection. The attacker needs to be authenticated and have privileges to create new credentials, but could use this to show information and run scripts to other users into the same Confidant instance.
References
- github.com/advisories/GHSA-rxq8-q85f-m866
- github.com/lyft/confidant
- github.com/lyft/confidant/commit/8876b07abde0c8d2a4974f79b60562b6d0193db9
- github.com/lyft/confidant/security/advisories/GHSA-rxq8-q85f-m866
- hackerone.com/reports/2332004
- hackerone.com/reports/2456673
- hackerone.com/reports/2476542
- nvd.nist.gov/vuln/detail/CVE-2024-45793
Detect and mitigate CVE-2024-45793 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →