Cross-site Scripting (XSS) - Stored in alanaktion/phproject

Valid

Reported on

Sep 11th 2021


✍️ Description

stored xss via svg file upload

🕵️‍♂️ Proof of Concept

Here i uses demo site https://demo.phproject.org .
1. First goto any project and upload a svg file https://github.com/ranjit-git/poc/blob/master/evilsvgfile.svg .
2. Now open this svg file using url like https://demo.phproject.org/files/1/evilsvgfile.svg and see xss is executed .

I put javascript xss payload in above svg file

VIDEO

https://drive.google.com/file/d/1gLzLG8RLeg5Wh9fVsS2u3iPh6O_42-aK/view?usp=sharing

💥 Impact

Stored xss allow to execute javascript code in victim account

We have contacted a member of the alanaktion/phproject team and are waiting to hear back 2 years ago
Alan Hardman validated this vulnerability a year ago
ranjit-git has been awarded the disclosure bounty
The fix bounty is now up for grabs
Alan Hardman marked this as fixed in v1.7.12 with commit 11989f a year ago
Alan Hardman has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation