Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
Jan 21st 2022
Hi there, I would like to report a vulnerability that allows a hacker to upload dangerous file type in jsdecena/laracom.
Attacker must have an account with permission to Edit Product (E.g.
Then, he can upload malcious file with extensions such as html, svg,... which leads to XSS.
Proof of Concept
After login, go to
Products / List Products, click on
Actions / Edit.
Imagesfields, upload html files with xss payload inside. For example:
<script> alert(document.cookie) </script>.
updatebutton to save.
Demo Video: https://drive.google.com/file/d/1BsfbHp1I47E02ZKaa6ZhcjmHMxD6Jho4/view?usp=sharing
This vulnerability is capable of uploading dangerous file to serve
We are processing your report and will contact the jsdecena/laracom team within 24 hours. a year ago
We have sent a second follow up to the jsdecena/laracom team. We will try again in 10 days. a year ago
A jsdecena/laracom maintainer validated this vulnerability a year ago
supernaruto16 has been awarded the disclosure bounty
The fix bounty is now up for grabs
A jsdecena/laracom maintainer marked this as fixed in v2.0.9 with commit 256026 a year ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation