Unrestricted Upload of File with Dangerous Type in microweber/microweber
Valid
Reported on
Mar 10th 2022
Description
Malicious user can bypass checking and upload .phtm or .php6 file which leads to stored XSS.
Proof of Concept
- Step 1: Login as admin at https://demo.microweber.org/demo/admin/
- Step 2: Go to Websites setting and Edit any page (https://demo.microweber.org/demo/admin/page/24/edit)
- Under Pictures tag, choose Add files with content and extension below
.phtm
<a id=x tabindex=1 onfocus=alert(1) autofocus></a>
https://demo.microweber.org/demo/userfiles/media/default/123_7.phtm https://drive.google.com/file/d/1eDNDRLquNuev0diRuMt3Z2cxKhEj5bt4/
.php6
<img src=x onerror=alert(origin)>
https://demo.microweber.org/demo/userfiles/media/default/123.php6 https://drive.google.com/file/d/15KatRGUfbCndq3oMHhUzjXosIfTGW908/
Impact
Stored XSS
We are processing your report and will contact the
microweber
team within 24 hours.
a year ago
Hi Maintainer,
I think you have a bit of confusion in the patch. The extension to prevent is .phtm, .phtml has been blacklisted before.
Regards.
to join this conversation