-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
High Vulnerability Notification #115
Comments
@yamerooo123 First and foremost, I would like to extend our sincere gratitude for your professional dedication and concern for the security of our website. We take the XSS vulnerability in SVG images that you've reported very seriously. We are acutely aware of the gravity of this issue and have initiated an immediate response. Our team will validate the vulnerability using the steps you've provided and develop a remediation plan accordingly. We are committed to addressing this security concern promptly to safeguard our users' data. We greatly appreciate your responsible disclosure, choosing to alert us about this vulnerability rather than exploiting it for any nefarious purposes. Your conduct is a testament to the importance of maintaining cybersecurity. Would you be available to provide additional details or assist us further in investigating and resolving this issue? We value our collaboration with the security community to ensure the highest level of safety on our platform. |
I believe that every function that allow users to upload images are vulnerable to XSS SVG. The following HTTP request is vulnerable to the said attack. For example, UI URL: HTTP Request:
Recommendation:
Payload: This is a malicious payload that can use to perform quick assessment.(Note that you don't have to create a web server to see the result as shown in the video to see the result. But if you want to, you are free to do so.) You can paste it in VSCode and save it as .svg file.
|
Hello Innoshop team,
I am a security researcher and i perform security testing for free.
This is a notification that i have found a high vulnerability in your web application.
Your web application is vulnerable to XSS SVG (Cross-Site Scripting in SVG image) which allow an attacker to steal cookies. This cookies can be use for identification. It is possible that an attacker with low-privileged can steal admin's cookies.
For the proof of concept (PoC), please follow these steps or watch PoC video.
YouTube video: https://youtu.be/ved96wsIYlQ
The text was updated successfully, but these errors were encountered: