Loading HuntDB...

Stored XSS on upload files leads to steal cookie

High
P
Palo Alto Software
Submitted None
Reported by homaa

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
## Summary: There isn't a check mechanism on file format in Inbox which an attacker can send an SVG file as other formats such as png, gif or bmp by rename and change file format leads XSS attack and steal victim cookies. ## Steps To Reproduce: You should create 2 accounts : First account for the attacker and second one for the victim. The attacker in my scenario: [email protected] The victim in my scenario: [email protected] 1. Please log in to the first account via this [link] (https://app.outpost.co/sign-in) 1. From Inbox create New Conversation and attached following files (Attached on this report) and send These files are an SVG file which changes file format to png, bmp, gif If you want to see payload open file by notepad. you'll see payload like the following code : ``` <svg version="1.0" xmlns="http://www.w3.org/2000/svg" width="2560.000000pt" height="1600.000000pt" viewBox="0 0 2560.000000 1600.000000" preserveAspectRatio="xMidYMid meet" onload="alert(document.cookie)"> ``` 1. Whenever victim clicks on each file, open a new tab and XSS attack occurs and steal the victim's cookie. ## Supporting Material/References: Browsers : Mozilla Firefox 71.0 Google Chrome 79.0.3945.88 * [attachment / reference] For clarification, you can watch POC file (Attached on this report) If you have any questions, let me know. Best regards. ## Impact Attacker can send malicious files to victims and steals victim's cookie leads to account takeover.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cross-site Scripting (XSS) - Stored