Lucene search

K
hackeroneMuon4H1:808672
HistoryMar 02, 2020 - 12:18 p.m.

Visma Bug Bounty Program: Stored XSS when uploading files to an invoice

2020-03-0212:18:20
muon4
hackerone.com
$250
167

I’ve found a stored XSS from the fileupload. The parameter fileID is vulnerable and will be stored to the page.

Steps To Reproduce

  • Login
  • Navigate to one of your invoices
  • Upload some file and intercept the traffic
  • Once you see the JSON payload like this {“id”:“abcabccabcabc”,“name”:“file-name”} modify it for this {“id”:“abcabc"><svg/onload=confirm(1)>abcabc”,“name”:“file-name”}
  • Refresh the page and see that javascript will be executed