Stored XSS via SVG File in microweber/microweber
Reported on
Jul 6th 2022
Description
By uploading SVG files, the users can perform Stored XSS attack.
Payload
Copy the following code and save as filename.svg.
<x:script xmlns:x="http://www.w3.org/1999/xhtml">alert(document.domain)</x:script>
Proof of Concept
[1] Login as admin.
[2] upload the payload injected SVG file at
https://demo.microweber.org/demo/admin/view:modules/load_module:files
[3] Copy the uploaded svg file url and open in new tab.
[4] XSS!
Impact
If an attacker can execute the script in the victim's browser via SVG file, they might compromise that user by stealing its cookies.
Hi, this issue has been already fixed
Hello again. I think my report is not a duplicate because this vulnerability is still exist on version 1.2.19. Although server return 500 error, it still uploads the malicious SVG file successfully, I have PoC video. If you still need a PoC video, i will share with you.
Hi, i see
I have added a fix in this commit, so you can make this issue as valid
https://github.com/microweber/microweber/commit/d35e691e72d358430abc8e99f5ba9eb374423b9f
@admin, can you make the issue as valid ?
Thanks for getting in touch. We will have this issue sorted ASAP :)
@admin , can you please ask the maintainer to confirm that a fix has been merged and ready to proceed with the CVE?
I have reverted the status of the report to pending
.
@maintainer - please feel free to proceed with marking this report as Valid and Fixed
. A CVE will automatically be assigned and published once this is done 👍
@admins why this report is marked as “ This vulnerability will not receive a CVE” even after i got a CVE for this report?
Hi Thwin, as this report took a long time to validate the frontend is out of sync with when this report was first validated.