Loading HuntDB...

Stored XSS Via Filename On https://partners.line.me/

Low
L
LY Corporation
Submitted None

Team Summary

Official summary from LY Corporation

When uploading a file to “partners.line.me” with a filename containing an XSS payload, the server did not escape the filename. This caused DOM-based XSS to be embedded in HTML. Uploaded files were stored for a certain period of time only. However, as long as they were available on the server, accessing the path triggered XSS and the saved payload was displayed without escaping. Yet, it turned out that cookie theft was not possible.

Reported by rioncool22

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$100.00

Submitted

Weakness

Cross-site Scripting (XSS) - Stored