-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Folder Image allows upload .svg file and execute arbitrary javascript code #494
Comments
Thanks, We will check & fix it soon. |
The vulnerability was found by me 2 months ago but I don't know why the huntr's system didn't send it to you. Thanks ^^!! |
Thanks @noobpk, We found this security issue & have also fixed it. |
@noobpk, Not able to validate your report on huntr. |
@vipin-shrivastava You need login in Huntr platform with a maintainer account. Because the report is private. Only maintainer and reporter can view the report ^^!! |
done 👍 |
Thanks. I see you fixed that. It would be great if you confirmed the fix on huntr to change the report status to public. |
Description
Stored XSS via 'Folder Image' when Add Folder
How to reproduce
Example SVG
The XSS will trigger when access folder image
Example: https://demo.uvdesk.com/uvdesk-demo-118-70-149-30//assets/knowledgebase/lIkHGHFooTYEKQOu.svg
Possible Solution
Using CSP or don't allow upload .svg extension
Additional context
Disclosure : https://huntr.dev/bounties/31e2217a-aa0c-4d0a-96ec-0bc1987a2808/
The text was updated successfully, but these errors were encountered: