You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In PartKeepr versions up to and including 1.4.0, the attachment upload functionality allows an authenticated remote attacker to achieve an XSS on the application by uploading an HTML file.
Steps to reproduce
Go to 'Add Part'.
Click on 'Attachments'.
Click on 'Add'.
Loads a malicious HTML file (containing JS)
Click on 'Upload'.
Click on the uploaded file to download it and you will see how the JS previously defined in the malicious HTML file is executed.
Expected behavior
That there are controls and validations on the types of files (as well as their content) that are uploaded to the server.
Observed behavior
An authenticated remote attacker can upload malicious HTML files to exploit an XSS.
Bug description
In PartKeepr versions up to and including 1.4.0, the attachment upload functionality allows an authenticated remote attacker to achieve an XSS on the application by uploading an HTML file.
Steps to reproduce
Expected behavior
That there are controls and validations on the types of files (as well as their content) that are uploaded to the server.
Observed behavior
An authenticated remote attacker can upload malicious HTML files to exploit an XSS.
Exploit
Screenshots
System Information
Best regards,
@Retr02332
The text was updated successfully, but these errors were encountered: