Cross-site Scripting (XSS) - Stored in alanaktion/phproject

Valid

Reported on

Sep 11th 2021


✍️ Description

stored xss via svg file upload

🕵️‍♂️ Proof of Concept

Here i uses demo site https://demo.phproject.org .
1. First goto any project and upload a svg file https://github.com/ranjit-git/poc/blob/master/evilsvgfile.svg .
2. Now open this svg file using url like https://demo.phproject.org/files/1/evilsvgfile.svg and see xss is executed .

I put javascript xss payload in above svg file

VIDEO

https://drive.google.com/file/d/1gLzLG8RLeg5Wh9fVsS2u3iPh6O_42-aK/view?usp=sharing

💥 Impact

Stored xss allow to execute javascript code in victim account

We have contacted a member of the alanaktion/phproject team and are waiting to hear back 9 months ago
Alan Hardman validated this vulnerability 4 months ago
ranjit-git has been awarded the disclosure bounty
The fix bounty is now up for grabs
Alan Hardman confirmed that a fix has been merged on 11989f 4 months ago
Alan Hardman has been awarded the fix bounty
to join this conversation