$256 Bounty : XSS via Web Cache Poisoning in Discourse
安全研究员Bobrov发现Discourse平台中存在通过X-Forwarded-Host头注入的XSS漏洞,并结合Web缓存欺骗技术使恶意载荷持久化影响其他用户。此漏洞影响多个Discourse实例(如Mozilla和NextCloud),Bobrov因此获得$256赏金。该案例展示了配置错误如何引发跨实例严重安全问题。 2025-5-13 05:48:48 Author: infosecwriteups.com(查看原文) 阅读量:11 收藏

How Injecting Headers and Poisoning Cache Led to Stored Cross-Site Scripting

Monika sharma

Summary

Security researcher Bobrov uncovered a potent combination of vulnerabilities in multiple live Discourse instances including those of Mozilla NextCloud and others. The core issue? An XSS vulnerability via the X-Forwarded-Host header amplified by Web Cache Deception enabling an attacker to persist the malicious payload for other users.

This clever exploitation of a cache + header based injection earned bobrov a $256 bounty and is a great example of how small misconfigurations can escalate into serious cross instance vulnerabilities.

Understanding the Vulnerability

Discourse an open source forum platform loads fonts with preloading and caching techniques that utilize the host’s domain in the URL. It uses a partial ERB template:

<% woff2_url = "#{asset_path("fontawesome-webfont.woff2")}?#{font_domain}&v=4.7.0".html_safe %>
<link rel="preload" href="<%= woff2_url %>" as="font" type="font/woff2" crossorigin />

If you inject a payload inside the X-Forwarded-Host header (used for reverse proxy headers) and that header is unsanitized in the HTML you…


文章来源: https://infosecwriteups.com/256-bounty-xss-via-web-cache-poisoning-in-discourse-594d5961555e?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh