Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1tMzZ4LW1nZmgtOGc3OM0l_w
Subdomain Takeover in Interactsh server
A domain configured with interactsh server was vulnerable to subdomain takeover for specfic subdomain, i.e app
, Interactsh server before < 1.0.0
used to create cname entries for app
pointing to projectdiscovery.github.io
as default which intended to used for hosting interactsh web client using GitHub pages. It turns out to be a security issue with a self-hosted interactsh server in which the user may not have configured a web client but still have a cname entry pointing to GitHub pages, making them vulnerable to subdomain takeover.
This issue was initially reported to us as a subdomain takeover for one of our domains that runs interactsh server by Melih at [email protected]
, and after conducting an internal investigation, we determined that it was an issue with the default config of interactsh server affecting all the server running self-hosted instance of interactsh, as a result - cname entry has been removed in the latest release.
Impact
This allows one to host / run arbitrary client side code (XSS) in a user's browser when browsing the vulnerable subdomain, for more details on the impact, please read this detailed blogpost from Detectify.
Patches
Update to Interactsh server v1.0.0 with go install -v github.com/projectdiscovery/interactsh/cmd/interactsh-server@latest
References
https://github.com/projectdiscovery/interactsh/issues/136
For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1tMzZ4LW1nZmgtOGc3OM0l_w
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 3 years ago
Updated: about 1 year ago
CVSS Score: 6.1
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS Percentage: 0.00098
EPSS Percentile: 0.41796
Identifiers: GHSA-m36x-mgfh-8g78, CVE-2023-36474
References:
- https://github.com/projectdiscovery/interactsh/security/advisories/GHSA-m36x-mgfh-8g78
- https://github.com/projectdiscovery/interactsh/issues/136
- https://nvd.nist.gov/vuln/detail/CVE-2023-36474
- https://github.com/projectdiscovery/interactsh/pull/155
- https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/
- https://github.com/advisories/GHSA-m36x-mgfh-8g78
Blast Radius: 12.4
Affected Packages
go:github.com/projectdiscovery/interactsh
Dependent packages: 66Dependent repositories: 109
Downloads:
Affected Version Ranges: < 1.0.0
Fixed in: 1.0.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.2.0, 1.2.1, 1.2.2, 1.2.3