Unrestricted Upload of File with Dangerous Type in jsdecena/laracom


Reported on

Jan 21st 2022


Hi there, I would like to report a vulnerability that allows a hacker to upload dangerous file type in jsdecena/laracom.

Attacker must have an account with permission to Edit Product (E.g. Clerk role).

Then, he can upload malcious file with extensions such as html, svg,... which leads to XSS.

Proof of Concept

  • ​After login, go to Products / List Products, click on Actions / Edit.

  • In Cover or Images fields, upload html files with xss payload inside. For example: <script> alert(document.cookie) </script>.

  • Click on update button to save.

  • Demo Video: https://drive.google.com/file/d/1BsfbHp1I47E02ZKaa6ZhcjmHMxD6Jho4/view?usp=sharing


This vulnerability is capable of uploading dangerous file to serve

We are processing your report and will contact the jsdecena/laracom team within 24 hours. 4 months ago
We have contacted a member of the jsdecena/laracom team and are waiting to hear back 4 months ago
We have sent a follow up to the jsdecena/laracom team. We will try again in 7 days. 4 months ago
We have sent a second follow up to the jsdecena/laracom team. We will try again in 10 days. 4 months ago
jsdecena/laracom maintainer validated this vulnerability 4 months ago
supernaruto16 has been awarded the disclosure bounty
The fix bounty is now up for grabs
jsdecena/laracom maintainer confirmed that a fix has been merged on 256026 4 months ago
The fix bounty has been dropped
to join this conversation