Markdown parsing issue enables insertion of malicious tags

Disclosed: 2017-08-21 13:28:46 By ru94mb To gratipay
Unknown
Vulnerability Details
Markdown tags and event handlers can be used to load malicious URLs in user's profile statement. Here is the payload that when entered in user's profile statement leads to the following HTML: Payload: _www.attacker.com/malicious.exe_ Resulting HTML: "html": "<p><em><a href=\"http://www.attacker.com/malicious.exe\">www.attacker.com/malicious.exe</a></em></p>\n" See the following screenshots for more details: "Profile.jpg" "request.jpg" "response.jpg" User can be redirected to malicious URLs and malware can be hosted on gratipay.com using this vulnerability. Fix: Disable the functionality for these markdown tags.
Actions
View on HackerOne
Report Stats
  • Report ID: 116512
  • State: Closed
  • Substate: informative
Share this report