Skip to main content

CVE-2022-31113: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in thinkst canarytokens

Medium
Published: Fri Jul 01 2022 (07/01/2022, 16:30:19 UTC)
Source: CVE
Vendor/Project: thinkst
Product: canarytokens

Description

Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to disable or delete the affected Canarytoken, or view its activation history. It might also be used as a stepping stone towards revealing more information about the Canarytoken's creator to the attacker. For example, an attacker could recover the email address tied to the Canarytoken, or place Javascript on the history page that redirect the creator towards an attacker-controlled Canarytoken to show the creator's network location. An attacker could only act on the discovered Canarytoken. This issue did not expose other Canarytokens or other Canarytoken creators. The issue has been patched on Canarytokens.org and in the latest release. No signs of successful exploitation of this vulnerability have been found. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 03:05:08 UTC

Technical Analysis

CVE-2022-31113 is a Cross-Site Scripting (XSS) vulnerability identified in the Canarytokens project by thinkst. Canarytokens is an open-source tool designed to help organizations track unauthorized activity and actions within their networks by deploying unique, trackable tokens (such as URLs) that alert the creator when triggered. The vulnerability exists specifically in the history page of triggered Canarytokens hosted on the canarytokens.org domain. When a Canarytoken is triggered, its activation details are recorded and displayed on this history page. Due to improper neutralization of input during web page generation (CWE-79), an attacker who discovers an HTTP-based Canarytoken URL can inject malicious JavaScript code into the history page. This JavaScript executes when the Canarytoken creator later views the history page, enabling the attacker to perform actions such as disabling or deleting the affected Canarytoken, viewing its activation history, or extracting sensitive information about the Canarytoken creator. For instance, the attacker could recover the email address associated with the Canarytoken or redirect the creator to an attacker-controlled Canarytoken, potentially revealing the creator's network location. Importantly, the vulnerability is limited in scope: it only affects the specific discovered Canarytoken and does not expose other Canarytokens or creators. The issue has been patched in the latest release and on canarytokens.org, and no evidence of exploitation in the wild has been found. Users are strongly advised to upgrade to the patched version as no workarounds exist.

Potential Impact

For European organizations using Canarytokens, this vulnerability poses a moderate risk primarily to the confidentiality and integrity of their deception infrastructure. Successful exploitation could allow attackers to disable or delete specific Canarytokens, reducing the effectiveness of network monitoring and early intrusion detection. Additionally, attackers could gain sensitive information about the Canarytoken creator, such as email addresses or network location data, potentially facilitating targeted phishing or reconnaissance campaigns. While the vulnerability does not directly compromise broader network assets, the degradation of deception capabilities could delay detection of intrusions, increasing the risk of prolonged unauthorized access. Given that Canarytokens are often deployed by security teams to detect insider threats or external attackers, this vulnerability could undermine trust in these detection mechanisms. However, the impact is limited by the need for the attacker to have prior knowledge of a specific Canarytoken URL and the requirement that the creator visits the history page, which somewhat constrains exploitation opportunities.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade to the latest patched version of Canarytokens that addresses CVE-2022-31113. Since no workarounds exist, patching is the only effective measure. Organizations should audit their deployed Canarytokens to identify any that may have been exposed or triggered prior to patching and consider redeploying new tokens to replace potentially compromised ones. Additionally, organizations should restrict access to the Canarytoken history pages to trusted personnel only, ideally enforcing strong authentication and network segmentation to limit exposure. Monitoring access logs for unusual activity on these pages can help detect potential exploitation attempts. Security teams should also educate users responsible for managing Canarytokens about the risks of visiting history pages from untrusted networks or devices to reduce the risk of drive-by attacks. Finally, incorporating Content Security Policy (CSP) headers and input sanitization best practices in any custom Canarytoken deployments can further reduce XSS risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf36df

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 3:05:08 AM

Last updated: 8/12/2025, 8:27:05 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats