Stored XSS viva .svg file upload in polonel/trudesk
Reported on
Mar 19th 2022
Description
The application allows .svg files to upload which lead to stored XSS
Proof of Concept
1.Download the payload from this link:- https://drive.google.com/file/d/1c1BP5bxXBxtwLfRJTrEPgMWK1yVFDF2R/view?usp=sharing and upload it on your profile.
2.Now open the path of the uploaded image ( Either by right click on image then copy image address OR right-click, inspect the image, the URL will come in the inspect, edit it as HTML )
3.Then XSS will trigger for allowing malicious svg extension.
Video PoC
https://drive.google.com/file/d/1_KOXMP_-jMhF4jEtg6XI_NopDNp5ZRCM/view?usp=sharing
Impact
This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.
Sure, @maintainer, can you please confirm whether you would like us to assign and publish a CVE for this report?
@admin Maintainer is agree so can you please register a CVE for this report?
CVE assigned! 🎊
Please confirm the fix @maintainer, and then we will be able to publish the CVE.
@Chris @polonel @maintainer I am still able to reproduce the step for this report in the 1.2.0 version can you please also verify it from your side?
you can reproduce the step by downloading this SVG payload from this drive link: https://drive.google.com/file/d/1c1BP5bxXBxtwLfRJTrEPgMWK1yVFDF2R/view?usp=sharing
and upload it in the profile Image.