Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stored xss vuln in dev.near.org #203

Open
varun2117 opened this issue Dec 8, 2024 · 0 comments
Open

Stored xss vuln in dev.near.org #203

varun2117 opened this issue Dec 8, 2024 · 0 comments

Comments

@varun2117
Copy link

Vulnerability details
A stored XSS vulnerability exists in the profile picture upload functionality on dev.near.org. The application allows users to upload SVG files as profile pictures, but it does not sanitize the contents of the SVG. This enables an attacker to inject malicious scripts, leading to the execution of JavaScript when the image is viewed.

[ Validation steps]

  1. Navigate to the profile picture upload section on dev.near.org.

  2. Create a malicious SVG file with embedded JavaScript. Example content:
    Copy code

<script type="text/javascript"> alert(document.domain); </script> and paste it one note pad and save it as .svg file
  1. Upload the crafted SVG file as the profile picture or the background.

  2. Once uploaded, open/view the profile image (e.g., in a browser or image link).

  3. Observe that the JavaScript is executed, triggering the alert box.

  4. here is the image link https://ipfs.near.social/ipfs/bafkreidroiiw35saf3n7cjhrbkqv6iiyocltkmbuxg7bl5fl5axou32rvu

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant