Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
Valid
Reported on
Jan 21st 2022
Description
Hi there, I would like to report a vulnerability that allows a hacker to upload dangerous file type in jsdecena/laracom.
Attacker must have an account with permission to Edit Product (E.g. Clerk
role).
Then, he can upload malcious file with extensions such as html, svg,... which leads to XSS.
Proof of Concept
After login, go to
Products / List Products
, click onActions / Edit
.In
Cover
orImages
fields, upload html files with xss payload inside. For example:<script> alert(document.cookie) </script>
.Click on
update
button to save.Demo Video: https://drive.google.com/file/d/1BsfbHp1I47E02ZKaa6ZhcjmHMxD6Jho4/view?usp=sharing
Impact
This vulnerability is capable of uploading dangerous file to serve
We are processing your report and will contact the
jsdecena/laracom
team within 24 hours.
a year ago
We have contacted a member of the
jsdecena/laracom
team and are waiting to hear back
a year ago
We have sent a
follow up to the
jsdecena/laracom
team.
We will try again in 7 days.
a year ago
We have sent a
second
follow up to the
jsdecena/laracom
team.
We will try again in 10 days.
a year ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
to join this conversation