إرسال #607947: Portabilis i-diario 1.5.0 Cross Site Scriptingالمعلومات

عنوانPortabilis i-diario 1.5.0 Cross Site Scripting
الوصف### Summary An attacker can upload a malicious SVG file containing embedded JavaScript that is executed when the file is accessed directly. This results in Stored Cross-Site Scripting (XSS). ### Details The `justificativas-de-falta` endpoint allows users to upload files after upload a crafted svg the XSS could be trigger when open the file. Payload: ``` <svg xmlns="http://www.w3.org/2000/svg" fill="none"> <script> alert("This is an XSS-POC from CVEHUNTERS"); </script> </svg> ``` ### PoC Create the file with the payload and upload in the `justificativas-de-falta` endpoint: ![image](https://github.com/user-attachments/assets/44046662-8901-4ccd-96f0-03bcd941ceca) After that open the file to trigger the XSS ![image](https://github.com/user-attachments/assets/69aa6178-c16c-468f-9658-9280eb5d5922) ### Impact - Exploitation of these vulnerabilities allows an attacker to inject and store malicious JavaScript code on the server, which will be executed for all users accessing the affected pages. This malicious code can: - Steal sensitive user information (e.g., session cookies, authentication tokens), - Redirect users to malicious sites, - Manipulate the application's interface, enabling phishing attacks and other social engineering techniques, - Compromise the application's integrity, causing potentially severe impacts to user experience and security by [CVE-Hunters](https://github.com/Sec-Dojo-Cyber-House/cve-hunters)
المصدر⚠️ https://github.com/nmmorette/vulnerability-research/tree/main/idiario
المستخدم
 nmmorette (UID 87361)
ارسال02/07/2025 05:29 PM (10 أشهر منذ)
الاعتدال19/07/2025 07:53 AM (17 days later)
الحالةتمت الموافقة
إدخال VulDB316983 [Portabilis i-Diario 1.5.0 justificativas-de-falta Endpoint Anexo البرمجة عبر المواقع]
النقاط20

Do you know our Splunk app?

Download it now for free!