Unrestructed file upload in yetiforcecompany/yetiforcecrm
Reported on
Apr 14th 2022
Description
I found unrestricted file upload leads to xss, vulnerability can be exploited by uploading a crafted payload inside a file. Then, the vulnerability can be triggered when the user previews the files content.
Proof of Concept
unrestricted file upload payload
https://drive.google.com/file/d/1DQs5LKkndhwNhKmEaSUIgs6z7HlJybap/view?usp=sharing
Injection point
https://drive.google.com/file/d/1xLgMCTzVhQuWY7wnFEdx3FWLRsUShrtQ/view?usp=sharing
POC
https://drive.google.com/file/d/1oX3BnHhE5c6hwbPxYPvCpr8P34UK79Cu/view?usp=sharing
Impact
Attacker can send malicious files to the victims is able to retrieve the stored data from the web application without that data being made safe to render in the browser and steals victim's cookie leads to account takeover.
Occurrences
References
give more details on how to induce a vulnerability because we can't find it
Sir, Upload the given payload drive link, and inspite element open the upload link path , you got pop-up.
Sorry for the delayed reply, we had some days off due to holidays. Back to the topic... I understand, the problem is that the image is temporarily displayed by one of CKEditor's plugins.