| Título | Bytedesk <=1.3.9 Unrestricted Upload of File with Dangerous Type (CWE-434) |
|---|
| Descripción | The authenticated file upload endpoint routes SVG files through UploadWatermarkService.addWatermarkToFile(), which writes the file to disk without stripping embedded JavaScript. The POC uploads an SVG containing <script>alert(...)></script> to POST /api/v1/upload/file; the server returns HTTP 200 and a public URL. Visiting the URL triggers Stored XSS, bypassing watermark processing without sanitization. |
|---|
| Fuente | ⚠️ https://github.com/Bytedesk/bytedesk/issues/19 |
|---|
| Usuario | ZAST.AI (UID 87884) |
|---|
| Sumisión | 2026-02-26 07:03 (hace 2 meses) |
|---|
| Moderación | 2026-03-07 21:23 (10 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 349727 [Bytedesk hasta 1.3.9 SVG File UploadRestService.java handleFileUpload escalada de privilegios] |
|---|
| Puntos | 20 |
|---|