Loading HuntDB...

Stored Xss Vulnerability on ████████

High
U
U.S. Dept Of Defense
Submitted None
Reported by ali

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
**Summary:** A Xss vulnerability using svg file & html file. ## Step-by-step Reproduction Instructions 1. Go to https://██████████/SitePages/Register.aspx and register. 2. Go to `https://██████████/Profiles/My/#Your Username#/Blog/default.aspx` and click `Create a Post` button. 3. Click `Body` textarea and click `Insert` button. 4. Click `Upload File` button and choose file (mygf.html or evilsvgfile.svg) 5. Click `Ok` button and wait. 6. Click Preview button and you will see xss alert. PoC: 1. Go to https://████████/_login/default.aspx?ReturnUrl=%2f_layouts%2f15%2fauthenticate.aspx%3fsource%3d%2fConference&source=/Conference and login with this username and password: `username: ███████` `password: ███████` 2. Go to https://██████/Profiles/My/alobaloss/Blog/Lists/Photos/evilsvgfile.svg So, you can see xss alert. ## Impact Classic Stored Xss

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored