CVE-2023-36474

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-36474
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36474.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-36474
Aliases
Published
2023-06-28T22:15:09Z
Modified
2024-08-21T14:57:04.509104Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Interactsh is an open-source tool for detecting out-of-band interactions. Domains configured with interactsh server prior to version 1.0.0 were vulnerable to subdomain takeover for a specific subdomain, i.e app. Interactsh server used to create cname entries for app pointing to projectdiscovery.github.io as default, which intended to used for hosting interactsh web client using GitHub pages. This is a security issue with a self-hosted interactsh server in which the user may not have configured a web client but still have a CNAME entry pointing to GitHub pages, making them vulnerable to subdomain takeover. This allows a threat actor to host / run arbitrary client side code (cross-site scripting) in a user's browser when browsing the vulnerable subdomain. Version 1.0.0 fixes this issue by making CNAME optional, rather than default.

References

Affected packages

Git / github.com/projectdiscovery/interactsh

Affected ranges

Type
GIT
Repo
https://github.com/projectdiscovery/interactsh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7